Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-6816 (GCVE-0-2023-6816)
Vulnerability from cvelistv5
Published
2024-01-18 04:31
Modified
2025-08-04 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Red Hat | Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION |
Unaffected: 0:1.1.0-25.el6_10.13 < * cpe:/o:redhat:rhel_els:6 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" }, { "name": "RHSA-2024:0320", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "name": "RHSA-2024:0557", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "name": "RHSA-2024:0558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "name": "RHSA-2024:0597", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "name": "RHSA-2024:0607", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "name": "RHSA-2024:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "name": "RHSA-2024:0617", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "name": "RHSA-2024:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "name": "RHSA-2024:0626", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "name": "RHSA-2024:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "name": "RHSA-2024:2169", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "name": "RHSA-2024:2170", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "name": "RHSA-2024:2996", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "name": "RHBZ#2257691", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-30" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6816", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-18T14:05:47.630340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T21:19:20.905Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_els:6" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.1.0-25.el6_10.13", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.20.4-27.el7_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.8.0-31.el7_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-2.el8_9.7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "xorg-x11-server-Xwayland", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:21.1.3-15.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-6.el8_6.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-15.el8_8.7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-3.el9_3.6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ], "defaultStatus": "affected", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.20.11-24.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "xorg-x11-server-Xwayland", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.1.9-5.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-22.el9_0.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-14.el9_2.5", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "affected", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" } ], "credits": [ { "lang": "en", "value": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue." } ], "datePublic": "2024-01-16T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Important" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-04T21:03:55.383Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:0320", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "name": "RHSA-2024:0557", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "name": "RHSA-2024:0558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "name": "RHSA-2024:0597", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "name": "RHSA-2024:0607", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "name": "RHSA-2024:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "name": "RHSA-2024:0617", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "name": "RHSA-2024:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "name": "RHSA-2024:0626", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "name": "RHSA-2024:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "name": "RHSA-2024:2169", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "name": "RHSA-2024:2170", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "name": "RHSA-2024:2996", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "name": "RHSA-2025:12751", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "name": "RHBZ#2257691", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" } ], "timeline": [ { "lang": "en", "time": "2024-01-10T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-01-16T00:00:00+00:00", "value": "Made public." } ], "title": "Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer", "workarounds": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "x_redhatCweChain": "CWE-787: Out-of-bounds Write" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-6816", "datePublished": "2024-01-18T04:31:07.908Z", "dateReserved": "2023-12-14T04:34:38.017Z", "dateUpdated": "2025-08-04T21:03:55.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-6816\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-01-18T05:15:08.607\",\"lastModified\":\"2025-08-04T21:15:28.083\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.11\",\"matchCriteriaId\":\"565381E7-E0BD-408F-B970-34E9724B1B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"23.2.4\",\"matchCriteriaId\":\"1FE48099-1D7F-444E-8F0C-FAB71F25AD71\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0320\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0557\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0558\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0597\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0607\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0614\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0617\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0621\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0626\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0629\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2169\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2170\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2996\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12751\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-6816\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/01/18/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0597\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2170\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-6816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202401-30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240307-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/01/18/1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0320\", \"name\": \"RHSA-2024:0320\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0557\", \"name\": \"RHSA-2024:0557\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0558\", \"name\": \"RHSA-2024:0558\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0597\", \"name\": \"RHSA-2024:0597\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0607\", \"name\": \"RHSA-2024:0607\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0614\", \"name\": \"RHSA-2024:0614\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0617\", \"name\": \"RHSA-2024:0617\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0621\", \"name\": \"RHSA-2024:0621\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0626\", \"name\": \"RHSA-2024:0626\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0629\", \"name\": \"RHSA-2024:0629\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2169\", \"name\": \"RHSA-2024:2169\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2170\", \"name\": \"RHSA-2024:2170\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2996\", \"name\": \"RHSA-2024:2996\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-6816\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\", \"name\": \"RHBZ#2257691\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202401-30\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240307-0006/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T08:42:07.410Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-6816\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-01-18T14:05:47.630340Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-17T21:15:12.249Z\"}}], \"cna\": {\"title\": \"Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:rhel_els:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.1.0-25.el6_10.13\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::server\", \"cpe:/o:redhat:enterprise_linux:7::computenode\", \"cpe:/o:redhat:enterprise_linux:7::client\", \"cpe:/o:redhat:enterprise_linux:7::workstation\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.4-27.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::server\", \"cpe:/o:redhat:enterprise_linux:7::computenode\", \"cpe:/o:redhat:enterprise_linux:7::client\", \"cpe:/o:redhat:enterprise_linux:7::workstation\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.8.0-31.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-2.el8_9.7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:21.1.3-15.el8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_e4s:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_e4s:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_e4s:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-6.el8_6.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:8.8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-15.el8_8.7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-3.el9_3.6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-24.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:22.1.9-5.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-22.el9_0.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-14.el9_2.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-01-10T00:00:00+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2024-01-16T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2024-01-16T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2024:0320\", \"name\": \"RHSA-2024:0320\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0557\", \"name\": \"RHSA-2024:0557\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0558\", \"name\": \"RHSA-2024:0558\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0597\", \"name\": \"RHSA-2024:0597\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0607\", \"name\": \"RHSA-2024:0607\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0614\", \"name\": \"RHSA-2024:0614\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0617\", \"name\": \"RHSA-2024:0617\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0621\", \"name\": \"RHSA-2024:0621\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0626\", \"name\": \"RHSA-2024:0626\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0629\", \"name\": \"RHSA-2024:0629\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2169\", \"name\": \"RHSA-2024:2169\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2170\", \"name\": \"RHSA-2024:2170\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2996\", \"name\": \"RHSA-2024:2996\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12751\", \"name\": \"RHSA-2025:12751\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-6816\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\", \"name\": \"RHBZ#2257691\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-08-04T21:03:55.383Z\"}, \"x_redhatCweChain\": \"CWE-787: Out-of-bounds Write\"}}", "cveMetadata": "{\"cveId\": \"CVE-2023-6816\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-04T21:03:55.383Z\", \"dateReserved\": \"2023-12-14T04:34:38.017Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2024-01-18T04:31:07.908Z\", \"assignerShortName\": \"redhat\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
suse-su-2024:0116-1
Vulnerability from csaf_suse
Published
2024-01-16 12:30
Modified
2024-01-16 12:30
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-116,SUSE-SLE-SDK-12-SP5-2024-116,SUSE-SLE-SERVER-12-SP5-2024-116
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xorg-x11-server", "title": "Title of the patch" }, { "category": "description", "text": "This update for xorg-x11-server fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-116,SUSE-SLE-SDK-12-SP5-2024-116,SUSE-SLE-SERVER-12-SP5-2024-116", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0116-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0116-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240116-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0116-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" }, { "category": "self", "summary": "SUSE Bug 1218582", "url": "https://bugzilla.suse.com/1218582" }, { "category": "self", "summary": "SUSE Bug 1218583", "url": "https://bugzilla.suse.com/1218583" }, { "category": "self", "summary": "SUSE Bug 1218584", "url": "https://bugzilla.suse.com/1218584" }, { "category": "self", "summary": "SUSE Bug 1218585", "url": "https://bugzilla.suse.com/1218585" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "Security update for xorg-x11-server", "tracking": { "current_release_date": "2024-01-16T12:30:32Z", "generator": { "date": "2024-01-16T12:30:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0116-1", "initial_release_date": "2024-01-16T12:30:32Z", "revision_history": [ { "date": "2024-01-16T12:30:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.19.6-10.65.1.aarch64", "product": { "name": "xorg-x11-server-1.19.6-10.65.1.aarch64", "product_id": "xorg-x11-server-1.19.6-10.65.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "product": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "product_id": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "product": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.19.6-10.65.1.aarch64", "product": { "name": "xorg-x11-server-source-1.19.6-10.65.1.aarch64", "product_id": "xorg-x11-server-source-1.19.6-10.65.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.19.6-10.65.1.i586", "product": { "name": "xorg-x11-server-1.19.6-10.65.1.i586", "product_id": "xorg-x11-server-1.19.6-10.65.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.19.6-10.65.1.i586", "product": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.i586", "product_id": "xorg-x11-server-extra-1.19.6-10.65.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.19.6-10.65.1.i586", "product": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.i586", "product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.19.6-10.65.1.i586", "product": { "name": "xorg-x11-server-source-1.19.6-10.65.1.i586", "product_id": "xorg-x11-server-source-1.19.6-10.65.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.19.6-10.65.1.ppc64le", "product": { "name": "xorg-x11-server-1.19.6-10.65.1.ppc64le", "product_id": "xorg-x11-server-1.19.6-10.65.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "product": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "product_id": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "product": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.19.6-10.65.1.ppc64le", "product": { "name": "xorg-x11-server-source-1.19.6-10.65.1.ppc64le", "product_id": "xorg-x11-server-source-1.19.6-10.65.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.19.6-10.65.1.s390", "product": { "name": "xorg-x11-server-1.19.6-10.65.1.s390", "product_id": "xorg-x11-server-1.19.6-10.65.1.s390" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.19.6-10.65.1.s390", "product": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.s390", "product_id": "xorg-x11-server-extra-1.19.6-10.65.1.s390" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390", "product": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390", "product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.s390" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.19.6-10.65.1.s390", "product": { "name": "xorg-x11-server-source-1.19.6-10.65.1.s390", "product_id": "xorg-x11-server-source-1.19.6-10.65.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.19.6-10.65.1.s390x", "product": { "name": "xorg-x11-server-1.19.6-10.65.1.s390x", "product_id": "xorg-x11-server-1.19.6-10.65.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x", "product": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x", "product_id": "xorg-x11-server-extra-1.19.6-10.65.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "product": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.19.6-10.65.1.s390x", "product": { "name": "xorg-x11-server-source-1.19.6-10.65.1.s390x", "product_id": "xorg-x11-server-source-1.19.6-10.65.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.19.6-10.65.1.x86_64", "product": { "name": "xorg-x11-server-1.19.6-10.65.1.x86_64", "product_id": "xorg-x11-server-1.19.6-10.65.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "product": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "product_id": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64", "product": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64", "product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.19.6-10.65.1.x86_64", "product": { "name": "xorg-x11-server-source-1.19.6-10.65.1.x86_64", "product_id": "xorg-x11-server-source-1.19.6-10.65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x" }, "product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64" }, "product_reference": "xorg-x11-server-1.19.6-10.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:30:32Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:30:32Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:30:32Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:30:32Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
suse-su-2024:0114-1
Vulnerability from csaf_suse
Published
2024-01-16 12:29
Modified
2024-01-16 12:29
Summary
Security update for xwayland
Notes
Title of the patch
Security update for xwayland
Description of the patch
This update for xwayland fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-114,SUSE-SLE-Product-WE-15-SP5-2024-114,openSUSE-SLE-15.5-2024-114
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xwayland", "title": "Title of the patch" }, { "category": "description", "text": "This update for xwayland fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-114,SUSE-SLE-Product-WE-15-SP5-2024-114,openSUSE-SLE-15.5-2024-114", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0114-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0114-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240114-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0114-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" }, { "category": "self", "summary": "SUSE Bug 1218582", "url": "https://bugzilla.suse.com/1218582" }, { "category": "self", "summary": "SUSE Bug 1218583", "url": "https://bugzilla.suse.com/1218583" }, { "category": "self", "summary": "SUSE Bug 1218584", "url": "https://bugzilla.suse.com/1218584" }, { "category": "self", "summary": "SUSE Bug 1218585", "url": "https://bugzilla.suse.com/1218585" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "Security update for xwayland", "tracking": { "current_release_date": "2024-01-16T12:29:41Z", "generator": { "date": "2024-01-16T12:29:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0114-1", "initial_release_date": "2024-01-16T12:29:41Z", "revision_history": [ { "date": "2024-01-16T12:29:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xwayland-22.1.5-150500.7.14.1.aarch64", "product": { "name": "xwayland-22.1.5-150500.7.14.1.aarch64", "product_id": "xwayland-22.1.5-150500.7.14.1.aarch64" } }, { "category": "product_version", "name": "xwayland-devel-22.1.5-150500.7.14.1.aarch64", "product": { "name": "xwayland-devel-22.1.5-150500.7.14.1.aarch64", "product_id": "xwayland-devel-22.1.5-150500.7.14.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xwayland-22.1.5-150500.7.14.1.i586", "product": { "name": "xwayland-22.1.5-150500.7.14.1.i586", "product_id": "xwayland-22.1.5-150500.7.14.1.i586" } }, { "category": "product_version", "name": "xwayland-devel-22.1.5-150500.7.14.1.i586", "product": { "name": "xwayland-devel-22.1.5-150500.7.14.1.i586", "product_id": "xwayland-devel-22.1.5-150500.7.14.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xwayland-22.1.5-150500.7.14.1.ppc64le", "product": { "name": "xwayland-22.1.5-150500.7.14.1.ppc64le", "product_id": "xwayland-22.1.5-150500.7.14.1.ppc64le" } }, { "category": "product_version", "name": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "product": { "name": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "product_id": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xwayland-22.1.5-150500.7.14.1.s390x", "product": { "name": "xwayland-22.1.5-150500.7.14.1.s390x", "product_id": "xwayland-22.1.5-150500.7.14.1.s390x" } }, { "category": "product_version", "name": "xwayland-devel-22.1.5-150500.7.14.1.s390x", "product": { "name": "xwayland-devel-22.1.5-150500.7.14.1.s390x", "product_id": "xwayland-devel-22.1.5-150500.7.14.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xwayland-22.1.5-150500.7.14.1.x86_64", "product": { "name": "xwayland-22.1.5-150500.7.14.1.x86_64", "product_id": "xwayland-22.1.5-150500.7.14.1.x86_64" } }, { "category": "product_version", "name": "xwayland-devel-22.1.5-150500.7.14.1.x86_64", "product": { "name": "xwayland-devel-22.1.5-150500.7.14.1.x86_64", "product_id": "xwayland-devel-22.1.5-150500.7.14.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xwayland-22.1.5-150500.7.14.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64" }, "product_reference": "xwayland-22.1.5-150500.7.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-22.1.5-150500.7.14.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64" }, "product_reference": "xwayland-22.1.5-150500.7.14.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-22.1.5-150500.7.14.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le" }, "product_reference": "xwayland-22.1.5-150500.7.14.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-22.1.5-150500.7.14.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x" }, "product_reference": "xwayland-22.1.5-150500.7.14.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-22.1.5-150500.7.14.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64" }, "product_reference": "xwayland-22.1.5-150500.7.14.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-22.1.5-150500.7.14.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64" }, "product_reference": "xwayland-devel-22.1.5-150500.7.14.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le" }, "product_reference": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-22.1.5-150500.7.14.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x" }, "product_reference": "xwayland-devel-22.1.5-150500.7.14.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-22.1.5-150500.7.14.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" }, "product_reference": "xwayland-devel-22.1.5-150500.7.14.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:29:41Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:29:41Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:29:41Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x", "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:29:41Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
suse-su-2024:0121-1
Vulnerability from csaf_suse
Published
2024-01-16 12:33
Modified
2024-01-16 12:33
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-121,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-121,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-121,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-121,SUSE-SLE-Product-WE-15-SP5-2024-121,SUSE-Storage-7.1-2024-121
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xorg-x11-server", "title": "Title of the patch" }, { "category": "description", "text": "This update for xorg-x11-server fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-121,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-121,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-121,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-121,SUSE-SLE-Product-WE-15-SP5-2024-121,SUSE-Storage-7.1-2024-121", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0121-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0121-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240121-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0121-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" }, { "category": "self", "summary": "SUSE Bug 1218582", "url": "https://bugzilla.suse.com/1218582" }, { "category": "self", "summary": "SUSE Bug 1218583", "url": "https://bugzilla.suse.com/1218583" }, { "category": "self", "summary": "SUSE Bug 1218584", "url": "https://bugzilla.suse.com/1218584" }, { "category": "self", "summary": "SUSE Bug 1218585", "url": "https://bugzilla.suse.com/1218585" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "Security update for xorg-x11-server", "tracking": { "current_release_date": "2024-01-16T12:33:53Z", "generator": { "date": "2024-01-16T12:33:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0121-1", "initial_release_date": "2024-01-16T12:33:53Z", "revision_history": [ { "date": "2024-01-16T12:33:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "product": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "product": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "product": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.aarch64", "product": { "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.aarch64", "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.aarch64", "product": { "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.aarch64", "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.i586", "product": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.i586", "product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.i586", "product": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.i586", "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.i586", "product": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.i586", "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.i586", "product": { "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.i586", "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.i586", "product": { "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.i586", "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "product": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "product": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "product": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.ppc64le", "product": { "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.ppc64le", "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.ppc64le", "product": { "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.ppc64le", "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "product": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "product": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "product": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.s390x", "product": { "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.s390x", "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.s390x", "product": { "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.s390x", "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "product": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "product": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "product": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.x86_64", "product": { "name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.x86_64", "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64", "product": { "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64", "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:33:53Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:33:53Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:33:53Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:33:53Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
suse-su-2024:0111-1
Vulnerability from csaf_suse
Published
2024-01-16 12:28
Modified
2024-01-16 12:28
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
Security fixes:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Other:
- Fix vmware graphics driver crash (bsc#1218176)
- Fix xserver crash when Xinerama is enabled (bsc#1218240)
Patchnames
SUSE-2024-111,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-111,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-111,SUSE-SLE-Product-RT-15-SP4-2024-111,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-111,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-111,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-111
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xorg-x11-server", "title": "Title of the patch" }, { "category": "description", "text": "This update for xorg-x11-server fixes the following issues:\n\nSecurity fixes:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n\nOther:\n\n- Fix vmware graphics driver crash (bsc#1218176)\n- Fix xserver crash when Xinerama is enabled (bsc#1218240)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-111,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-111,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-111,SUSE-SLE-Product-RT-15-SP4-2024-111,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-111,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-111,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-111", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0111-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0111-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240111-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0111-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" }, { "category": "self", "summary": "SUSE Bug 1218176", "url": "https://bugzilla.suse.com/1218176" }, { "category": "self", "summary": "SUSE Bug 1218240", "url": "https://bugzilla.suse.com/1218240" }, { "category": "self", "summary": "SUSE Bug 1218582", "url": "https://bugzilla.suse.com/1218582" }, { "category": "self", "summary": "SUSE Bug 1218583", "url": "https://bugzilla.suse.com/1218583" }, { "category": "self", "summary": "SUSE Bug 1218584", "url": "https://bugzilla.suse.com/1218584" }, { "category": "self", "summary": "SUSE Bug 1218585", "url": "https://bugzilla.suse.com/1218585" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "Security update for xorg-x11-server", "tracking": { "current_release_date": "2024-01-16T12:28:57Z", "generator": { "date": "2024-01-16T12:28:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0111-1", "initial_release_date": "2024-01-16T12:28:57Z", "revision_history": [ { "date": "2024-01-16T12:28:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "product": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "product_id": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "product": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "product": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.aarch64", "product": { "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.aarch64", "product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150400.38.40.1.i586", "product": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.i586", "product_id": "xorg-x11-server-1.20.3-150400.38.40.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.i586", "product": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.i586", "product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.i586", "product": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.i586", "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.i586", "product": { "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.i586", "product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "product": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "product_id": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "product": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "product": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.ppc64le", "product": { "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.ppc64le", "product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x", "product": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x", "product_id": "xorg-x11-server-1.20.3-150400.38.40.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "product": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "product": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.s390x", "product": { "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.s390x", "product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "product": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "product_id": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "product": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "product": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.x86_64", "product": { "name": "xorg-x11-server-source-1.20.3-150400.38.40.1.x86_64", "product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP4", "product_id": "SUSE Linux Enterprise Real Time 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP4", "product_id": "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP4", "product_id": "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP4", "product_id": "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" }, "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:57Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:57Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:57Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x", "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:57Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
suse-su-2024:0165-1
Vulnerability from csaf_suse
Published
2024-01-19 11:55
Modified
2024-01-19 11:55
Summary
Security update for xwayland
Notes
Title of the patch
Security update for xwayland
Description of the patch
This update for xwayland fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845)
- CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-165,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-165
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xwayland", "title": "Title of the patch" }, { "category": "description", "text": "This update for xwayland fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845)\n - CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846) \n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-165,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-165", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0165-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0165-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240165-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0165-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" }, { "category": "self", "summary": "SUSE Bug 1218582", "url": "https://bugzilla.suse.com/1218582" }, { "category": "self", "summary": "SUSE Bug 1218583", "url": "https://bugzilla.suse.com/1218583" }, { "category": "self", "summary": "SUSE Bug 1218584", "url": "https://bugzilla.suse.com/1218584" }, { "category": "self", "summary": "SUSE Bug 1218585", "url": "https://bugzilla.suse.com/1218585" }, { "category": "self", "summary": "SUSE Bug 1218845", "url": "https://bugzilla.suse.com/1218845" }, { "category": "self", "summary": "SUSE Bug 1218846", "url": "https://bugzilla.suse.com/1218846" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0408 page", "url": "https://www.suse.com/security/cve/CVE-2024-0408/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0409 page", "url": "https://www.suse.com/security/cve/CVE-2024-0409/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "Security update for xwayland", "tracking": { "current_release_date": "2024-01-19T11:55:09Z", "generator": { "date": "2024-01-19T11:55:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0165-1", "initial_release_date": "2024-01-19T11:55:09Z", "revision_history": [ { "date": "2024-01-19T11:55:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xwayland-21.1.4-150400.3.31.1.aarch64", "product": { "name": "xwayland-21.1.4-150400.3.31.1.aarch64", "product_id": "xwayland-21.1.4-150400.3.31.1.aarch64" } }, { "category": "product_version", "name": "xwayland-devel-21.1.4-150400.3.31.1.aarch64", "product": { "name": "xwayland-devel-21.1.4-150400.3.31.1.aarch64", "product_id": "xwayland-devel-21.1.4-150400.3.31.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xwayland-21.1.4-150400.3.31.1.i586", "product": { "name": "xwayland-21.1.4-150400.3.31.1.i586", "product_id": "xwayland-21.1.4-150400.3.31.1.i586" } }, { "category": "product_version", "name": "xwayland-devel-21.1.4-150400.3.31.1.i586", "product": { "name": "xwayland-devel-21.1.4-150400.3.31.1.i586", "product_id": "xwayland-devel-21.1.4-150400.3.31.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xwayland-21.1.4-150400.3.31.1.ppc64le", "product": { "name": "xwayland-21.1.4-150400.3.31.1.ppc64le", "product_id": "xwayland-21.1.4-150400.3.31.1.ppc64le" } }, { "category": "product_version", "name": "xwayland-devel-21.1.4-150400.3.31.1.ppc64le", "product": { "name": "xwayland-devel-21.1.4-150400.3.31.1.ppc64le", "product_id": "xwayland-devel-21.1.4-150400.3.31.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xwayland-21.1.4-150400.3.31.1.s390x", "product": { "name": "xwayland-21.1.4-150400.3.31.1.s390x", "product_id": "xwayland-21.1.4-150400.3.31.1.s390x" } }, { "category": "product_version", "name": "xwayland-devel-21.1.4-150400.3.31.1.s390x", "product": { "name": "xwayland-devel-21.1.4-150400.3.31.1.s390x", "product_id": "xwayland-devel-21.1.4-150400.3.31.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xwayland-21.1.4-150400.3.31.1.x86_64", "product": { "name": "xwayland-21.1.4-150400.3.31.1.x86_64", "product_id": "xwayland-21.1.4-150400.3.31.1.x86_64" } }, { "category": "product_version", "name": "xwayland-devel-21.1.4-150400.3.31.1.x86_64", "product": { "name": "xwayland-devel-21.1.4-150400.3.31.1.x86_64", "product_id": "xwayland-devel-21.1.4-150400.3.31.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Desktop 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Desktop 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sled-ltss:15:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xwayland-21.1.4-150400.3.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" }, "product_reference": "xwayland-21.1.4-150400.3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 15 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" } ], "product_status": { "fixed": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-19T11:55:09Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" } ], "product_status": { "fixed": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-19T11:55:09Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-0408", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0408" } ], "notes": [ { "category": "general", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" } ], "product_status": { "fixed": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0408", "url": "https://www.suse.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "SUSE Bug 1218845 for CVE-2024-0408", "url": "https://bugzilla.suse.com/1218845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-19T11:55:09Z", "details": "moderate" } ], "title": "CVE-2024-0408" }, { "cve": "CVE-2024-0409", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0409" } ], "notes": [ { "category": "general", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" } ], "product_status": { "fixed": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0409", "url": "https://www.suse.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "SUSE Bug 1218846 for CVE-2024-0409", "url": "https://bugzilla.suse.com/1218846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-19T11:55:09Z", "details": "moderate" } ], "title": "CVE-2024-0409" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", "title": "Vulnerability description" } ], "product_status": { "fixed": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-19T11:55:09Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", "title": "Vulnerability description" } ], "product_status": { "fixed": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-19T11:55:09Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
suse-su-2024:0109-1
Vulnerability from csaf_suse
Published
2024-01-16 12:28
Modified
2024-01-16 12:28
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
Security fixes:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Other:
- Fix vmware graphics driver crash (bsc#1218176)
- Fix xserver crash when Xinerama is enabled (bsc#1218240)
Patchnames
SUSE-2024-109,SUSE-SLE-Module-Basesystem-15-SP5-2024-109,SUSE-SLE-Module-Development-Tools-15-SP5-2024-109,openSUSE-SLE-15.5-2024-109
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xorg-x11-server", "title": "Title of the patch" }, { "category": "description", "text": "This update for xorg-x11-server fixes the following issues:\n\nSecurity fixes:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n\nOther:\n\n- Fix vmware graphics driver crash (bsc#1218176)\n- Fix xserver crash when Xinerama is enabled (bsc#1218240)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-109,SUSE-SLE-Module-Basesystem-15-SP5-2024-109,SUSE-SLE-Module-Development-Tools-15-SP5-2024-109,openSUSE-SLE-15.5-2024-109", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0109-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0109-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240109-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0109-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" }, { "category": "self", "summary": "SUSE Bug 1218176", "url": "https://bugzilla.suse.com/1218176" }, { "category": "self", "summary": "SUSE Bug 1218240", "url": "https://bugzilla.suse.com/1218240" }, { "category": "self", "summary": "SUSE Bug 1218582", "url": "https://bugzilla.suse.com/1218582" }, { "category": "self", "summary": "SUSE Bug 1218583", "url": "https://bugzilla.suse.com/1218583" }, { "category": "self", "summary": "SUSE Bug 1218584", "url": "https://bugzilla.suse.com/1218584" }, { "category": "self", "summary": "SUSE Bug 1218585", "url": "https://bugzilla.suse.com/1218585" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "Security update for xorg-x11-server", "tracking": { "current_release_date": "2024-01-16T12:28:03Z", "generator": { "date": "2024-01-16T12:28:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0109-1", "initial_release_date": "2024-01-16T12:28:03Z", "revision_history": [ { "date": "2024-01-16T12:28:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "product": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "product_id": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "product": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "product": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "product": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "product": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.4-150500.7.18.1.i586", "product": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.i586", "product_id": "xorg-x11-server-21.1.4-150500.7.18.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.i586", "product": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.i586", "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.i586", "product": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.i586", "product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.i586", "product": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.i586", "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.i586" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.i586", "product": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.i586", "product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "product": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "product_id": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "product": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "product": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "product": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x", "product": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x", "product_id": "xorg-x11-server-21.1.4-150500.7.18.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "product": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "product": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "product": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "product": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "product": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "product_id": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "product": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "product": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "product": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64", "product": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64", "product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64" }, "product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le" }, "product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x" }, "product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" }, "product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:03Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:03Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:03Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x", "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-16T12:28:03Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
rhsa-2024:0626
Vulnerability from csaf_redhat
Published
2024-01-31 08:35
Modified
2025-08-05 17:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0626", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0626.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:57:25+00:00", "generator": { "date": "2025-08-05T17:57:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0626", "initial_release_date": "2024-01-31T08:35:55+00:00", "revision_history": [ { "date": "2024-01-31T08:35:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-31T08:35:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:57:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.src", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.src", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "product": { "name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "product_id": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.5?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "product": { "name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "product_id": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.5?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "product": { "name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch" }, "product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch" }, "product_reference": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch" }, "product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0557
Vulnerability from csaf_redhat
Published
2024-01-30 11:00
Modified
2025-08-05 17:56
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0557", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0557.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:56:17+00:00", "generator": { "date": "2025-08-05T17:56:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0557", "initial_release_date": "2024-01-30T11:00:18+00:00", "revision_history": [ { "date": "2024-01-30T11:00:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T11:00:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:56:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.src", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.src", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "product": { "name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "product_id": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-3.el9_3.6?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "product": { "name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "product_id": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-3.el9_3.6?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "product": { "name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "product_id": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-3.el9_3.6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.src", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch" }, "product_reference": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch" }, "product_reference": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch" }, "product_reference": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2025:12751
Vulnerability from csaf_redhat
Published
2025-08-04 16:35
Modified
2025-08-05 17:56
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)
* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)
* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)
* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)
* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)
* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393)
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885,ZDI-CAN-22744)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886,ZDI-CAN-22840)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229,ZDI-CAN-22678)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)\n\n* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)\n\n* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)\n\n* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)\n\n* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)\n\n* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)\n\n* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)\n\n* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393)\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885,ZDI-CAN-22744)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886,ZDI-CAN-22840)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229,ZDI-CAN-22678)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\n* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:12751", "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2151755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755" }, { "category": "external", "summary": "2151756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756" }, { "category": "external", "summary": "2151757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757" }, { "category": "external", "summary": "2151758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758" }, { "category": "external", "summary": "2151760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760" }, { "category": "external", "summary": "2151761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761" }, { "category": "external", "summary": "2165995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995" }, { "category": "external", "summary": "2180288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288" }, { "category": "external", "summary": "2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "2271997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997" }, { "category": "external", "summary": "2271998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998" }, { "category": "external", "summary": "2272000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000" }, { "category": "external", "summary": "2317233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12751.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:56:30+00:00", "generator": { "date": "2025-08-05T17:56:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:12751", "initial_release_date": "2025-08-04T16:35:43+00:00", "revision_history": [ { "date": "2025-08-04T16:35:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-04T16:35:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:56:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product": { "name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product": { "name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.1.0-25.el6_10.13.src", "product": { "name": "tigervnc-0:1.1.0-25.el6_10.13.src", "product_id": "tigervnc-0:1.1.0-25.el6_10.13.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64", "product": { "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64", "product_id": "tigervnc-0:1.1.0-25.el6_10.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "product": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "product": { "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "product_id": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.1.0-25.el6_10.13?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x", "product": { "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x", "product_id": "tigervnc-0:1.1.0-25.el6_10.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "product": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "product": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.1.0-25.el6_10.13.i686", "product": { "name": "tigervnc-0:1.1.0-25.el6_10.13.i686", "product_id": "tigervnc-0:1.1.0-25.el6_10.13.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=i686" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686", "product": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686", "product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=i686" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "product": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=i686" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "product": { "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "product_id": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.1.0-25.el6_10.13?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "product": { "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "product_id": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.1.0-25.el6_10.13?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.s390x", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.src as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.src", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x" }, "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch" }, "product_reference": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)", "product_id": "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.s390x", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.src as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.src", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x" }, "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch" }, "product_reference": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686" }, "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)", "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" }, "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "relates_to_product_reference": "6Server-optional-ELS.EXTENSION" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4283", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151761" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org. This issue occurs because the XkbCopyNames function leaves a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: XkbGetKbdByName use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4283" }, { "category": "external", "summary": "RHBZ#2151761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4283", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: XkbGetKbdByName use-after-free" }, { "cve": "CVE-2022-46340", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2022-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151755" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: XTestSwapFakeInput stack overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46340" }, { "category": "external", "summary": "RHBZ#2151755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46340", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: XTestSwapFakeInput stack overflow" }, { "cve": "CVE-2022-46341", "discovery_date": "2022-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151756" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org. This issue occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: XIPassiveUngrab out-of-bounds access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46341" }, { "category": "external", "summary": "RHBZ#2151756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46341", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46341" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: XIPassiveUngrab out-of-bounds access" }, { "cve": "CVE-2022-46342", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151757" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org. This flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: XvdiSelectVideoNotify use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46342" }, { "category": "external", "summary": "RHBZ#2151757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: XvdiSelectVideoNotify use-after-free" }, { "cve": "CVE-2022-46343", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151758" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org. This issue occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This flaw can lead to local privileges elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: ScreenSaverSetAttributes use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46343" }, { "category": "external", "summary": "RHBZ#2151758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: ScreenSaverSetAttributes use-after-free" }, { "cve": "CVE-2022-46344", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151760" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org. The issue occurs because the handler for the XIChangeProperty request has a length-validation issue, resulting in out-of-bounds memory reads and potential information disclosure. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: XIChangeProperty out-of-bounds access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46344" }, { "category": "external", "summary": "RHBZ#2151760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: XIChangeProperty out-of-bounds access" }, { "cve": "CVE-2023-0494", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2165995" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0494" }, { "category": "external", "summary": "RHBZ#2165995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0494", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-5v6x-2hpj-c37x", "url": "https://github.com/advisories/GHSA-5v6x-2hpj-c37x" } ], "release_date": "2023-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation" }, { "cve": "CVE-2023-1393", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2180288" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in X.Org Server. This flaw occurs if a client explicitly destroys the compositor overlay window (aka COW), where Xserver leaves a dangling pointer to that window in the CompScreen structure, which will later trigger a use-after-free issue. The Overlay Window use-after-free issue can lead to a local privilege escalation vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9. Therefore, Red Hat Enterprise Linux 8 and 9 have been rated Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1393" }, { "category": "external", "summary": "RHBZ#2180288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1393" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-March/003374.html", "url": "https://lists.x.org/archives/xorg-announce/2023-March/003374.html" } ], "release_date": "2023-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability" }, { "cve": "CVE-2023-5367", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243091" } ], "notes": [ { "category": "description", "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5367" }, { "category": "external", "summary": "RHBZ#2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6478", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253298" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6478" }, { "category": "external", "summary": "RHBZ#2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "cve": "CVE-2024-9632", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-10-08T13:37:25.514000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2317233" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-9632" }, { "category": "external", "summary": "RHBZ#2317233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9632", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9632" } ], "release_date": "2024-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" }, { "cve": "CVE-2024-31080", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "discovery_date": "2024-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271997" } ], "notes": [ { "category": "description", "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-31080" }, { "category": "external", "summary": "RHBZ#2271997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080" } ], "release_date": "2024-04-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents" }, { "cve": "CVE-2024-31081", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "discovery_date": "2024-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271998" } ], "notes": [ { "category": "description", "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-31081" }, { "category": "external", "summary": "RHBZ#2271998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081" } ], "release_date": "2024-04-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice" }, { "cve": "CVE-2024-31083", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2272000" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-31083" }, { "category": "external", "summary": "RHBZ#2272000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083" } ], "release_date": "2024-04-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-04T16:35:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src", "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x", "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64", "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686", "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs" } ] }
rhsa-2024:2170
Vulnerability from csaf_redhat
Published
2024-04-30 09:50
Modified
2025-08-18 11:22
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2170", "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index" }, { "category": "external", "summary": "2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2170.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update", "tracking": { "current_release_date": "2025-08-18T11:22:47+00:00", "generator": { "date": "2025-08-18T11:22:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:2170", "initial_release_date": "2024-04-30T09:50:06+00:00", "revision_history": [ { "date": "2024-04-30T09:50:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-30T09:50:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T11:22:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5367", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243091" } ], "notes": [ { "category": "description", "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5367" }, { "category": "external", "summary": "RHBZ#2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6377", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253291" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6377" }, { "category": "external", "summary": "RHBZ#2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6478", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253298" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6478" }, { "category": "external", "summary": "RHBZ#2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0617
Vulnerability from csaf_redhat
Published
2024-01-31 07:10
Modified
2025-08-05 17:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0617", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0617.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:57:12+00:00", "generator": { "date": "2025-08-05T17:57:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0617", "initial_release_date": "2024-01-31T07:10:52+00:00", "revision_history": [ { "date": "2024-01-31T07:10:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-31T07:10:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:57:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.9.0-15.el8_2.9.src", "product": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src", "product_id": "tigervnc-0:1.9.0-15.el8_2.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "product": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "product_id": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "product": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "product_id": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "product": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:2996
Vulnerability from csaf_redhat
Published
2024-05-22 10:12
Modified
2025-08-18 11:23
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2996", "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index" }, { "category": "external", "summary": "2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2996.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update", "tracking": { "current_release_date": "2025-08-18T11:23:12+00:00", "generator": { "date": "2025-08-18T11:23:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:2996", "initial_release_date": "2024-05-22T10:12:23+00:00", "revision_history": [ { "date": "2024-05-22T10:12:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-05-22T10:12:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T11:23:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5367", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243091" } ], "notes": [ { "category": "description", "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5367" }, { "category": "external", "summary": "RHBZ#2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6377", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253291" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6377" }, { "category": "external", "summary": "RHBZ#2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6478", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253298" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6478" }, { "category": "external", "summary": "RHBZ#2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0320
Vulnerability from csaf_redhat
Published
2024-01-22 13:53
Modified
2025-08-05 17:55
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0320", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0320.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server security update", "tracking": { "current_release_date": "2025-08-05T17:55:22+00:00", "generator": { "date": "2025-08-05T17:55:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0320", "initial_release_date": "2024-01-22T13:53:02+00:00", "revision_history": [ { "date": "2024-01-22T13:53:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-22T13:53:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:55:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-0:1.20.4-27.el7_9.src", "product": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src", "product_id": "xorg-x11-server-0:1.20.4-27.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-27.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "product": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "product_id": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-27.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0558
Vulnerability from csaf_redhat
Published
2024-01-30 11:03
Modified
2025-08-05 17:56
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0558", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0558.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:56:30+00:00", "generator": { "date": "2025-08-05T17:56:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0558", "initial_release_date": "2024-01-30T11:03:52+00:00", "revision_history": [ { "date": "2024-01-30T11:03:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T11:03:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:56:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-8.el8_4.8.src", "product": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src", "product_id": "tigervnc-0:1.11.0-8.el8_4.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "product": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "product_id": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "product": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "product_id": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "product": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0597
Vulnerability from csaf_redhat
Published
2024-01-30 14:14
Modified
2025-08-05 17:55
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0597", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0597.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:55:50+00:00", "generator": { "date": "2025-08-05T17:55:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0597", "initial_release_date": "2024-01-30T14:14:03+00:00", "revision_history": [ { "date": "2024-01-30T14:14:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T14:14:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:55:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.src", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.src", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "product": { "name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "product_id": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "product": { "name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "product_id": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "product": { "name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch" }, "product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch" }, "product_reference": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch" }, "product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:2169
Vulnerability from csaf_redhat
Published
2024-04-30 10:11
Modified
2025-08-18 11:22
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\n* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2169", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index" }, { "category": "external", "summary": "2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "2244736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736" }, { "category": "external", "summary": "2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2169.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server security update", "tracking": { "current_release_date": "2025-08-18T11:22:33+00:00", "generator": { "date": "2025-08-18T11:22:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:2169", "initial_release_date": "2024-04-30T10:11:05+00:00", "revision_history": [ { "date": "2024-04-30T10:11:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-30T10:11:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T11:22:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 9)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "product": { "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "product_id": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-24.el9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-0:1.20.11-24.el9.src", "product": { "name": "xorg-x11-server-0:1.20.11-24.el9.src", "product_id": "xorg-x11-server-0:1.20.11-24.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-24.el9?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src" }, "product_reference": "xorg-x11-server-0:1.20.11-24.el9.src", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src" }, "product_reference": "xorg-x11-server-0:1.20.11-24.el9.src", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "relates_to_product_reference": "CRB-9.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5367", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243091" } ], "notes": [ { "category": "description", "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5367" }, { "category": "external", "summary": "RHBZ#2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty" }, { "cve": "CVE-2023-5380", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2244736" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Use-after-free bug in DestroyWindow", "title": "Vulnerability summary" }, { "category": "other", "text": "The xorg-x11-server-Xwayland package as shipped by Red Hat Enterprise Linux 8 and 9 is not affected by this issue as Xwayland does not support multiple protocol screens and is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5380" }, { "category": "external", "summary": "RHBZ#2244736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Use-after-free bug in DestroyWindow" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6377", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253291" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6377" }, { "category": "external", "summary": "RHBZ#2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6478", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253298" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6478" }, { "category": "external", "summary": "RHBZ#2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0629
Vulnerability from csaf_redhat
Published
2024-01-31 08:52
Modified
2025-08-05 17:56
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0629", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0629.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:56:57+00:00", "generator": { "date": "2025-08-05T17:56:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0629", "initial_release_date": "2024-01-31T08:52:59+00:00", "revision_history": [ { "date": "2024-01-31T08:52:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-31T08:52:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:56:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.src", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.src", "product_id": "tigervnc-0:1.8.0-31.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "product": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "product_id": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-31.el7_9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "product": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "product_id": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-31.el7_9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "product": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "product_id": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-31.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0614
Vulnerability from csaf_redhat
Published
2024-01-30 15:25
Modified
2025-08-05 17:56
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0614", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0614.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:56:04+00:00", "generator": { "date": "2025-08-05T17:56:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0614", "initial_release_date": "2024-01-30T15:25:28+00:00", "revision_history": [ { "date": "2024-01-30T15:25:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T15:25:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:56:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.src", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.src", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "product": { "name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "product_id": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "product": { "name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "product_id": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "product": { "name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.src", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0621
Vulnerability from csaf_redhat
Published
2024-01-30 16:13
Modified
2025-08-05 17:56
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0621", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0621.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:56:44+00:00", "generator": { "date": "2025-08-05T17:56:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0621", "initial_release_date": "2024-01-30T16:13:28+00:00", "revision_history": [ { "date": "2024-01-30T16:13:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T16:13:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:56:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.src", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.src", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "product": { "name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "product_id": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "product": { "name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "product_id": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "product": { "name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch" }, "product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch" }, "product_reference": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch" }, "product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024:0607
Vulnerability from csaf_redhat
Published
2024-01-30 14:56
Modified
2025-08-05 17:55
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0607", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0607.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2025-08-05T17:55:37+00:00", "generator": { "date": "2025-08-05T17:55:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0607", "initial_release_date": "2024-01-30T14:56:13+00:00", "revision_history": [ { "date": "2024-01-30T14:56:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T14:56:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T17:55:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.src", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.src", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "product": { "name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "product_id": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "product": { "name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "product_id": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "product": { "name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.src", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch" }, "product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch" }, "product_reference": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch" }, "product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
ncsc-2024-0414
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:17
Modified
2024-10-17 13:17
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van gegevens
- Uitvoer van willekeurige code (Gebruikersrechten)
- Uitvoer van willekeurige code (Administratorrechten)
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-122
Heap-based Buffer Overflow
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-20
Improper Input Validation
CWE-466
Return of Pointer Value Outside of Expected Range
CWE-606
Unchecked Input for Loop Condition
CWE-390
Detection of Error Condition Without Action
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-222
Truncation of Security-relevant Information
CWE-364
Signal Handler Race Condition
CWE-450
Multiple Interpretations of UI Input
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-126
Buffer Over-read
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-427
Uncontrolled Search Path Element
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE-195
Signed to Unsigned Conversion Error
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-190
Integer Overflow or Wraparound
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-459
Incomplete Cleanup
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-248
Uncaught Exception
CWE-674
Uncontrolled Recursion
CWE-918
Server-Side Request Forgery (SSRF)
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Signal Handler Race Condition", "title": "CWE-364" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" }, { "category": "general", "text": "Signed to Unsigned Conversion Error", "title": "CWE-195" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Incomplete Cleanup", "title": "CWE-459" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Uncaught Exception", "title": "CWE-248" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2024-10-17T13:17:52.103171Z", "id": "NCSC-2024-0414", "initial_release_date": "2024-10-17T13:17:52.103171Z", "revision_history": [ { "date": "2024-10-17T13:17:52.103171Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670430", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635320", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670439", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670429", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670435", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670431", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670436", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670432", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635321", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674642", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670434", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674637", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670438", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635315", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670433", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674641", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670437", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635308", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications__10.4.0.4", "product": { "name": "communications__10.4.0.4", "product_id": "CSAFPID-1674629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.2", "product": { "name": "communications___23.4.2", "product_id": "CSAFPID-1670442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.3", "product": { "name": "communications___23.4.3", "product_id": "CSAFPID-1635325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.4", "product": { "name": "communications___23.4.4", "product_id": "CSAFPID-1635326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.5", "product": { "name": "communications___23.4.5", "product_id": "CSAFPID-1674645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.6", "product": { "name": "communications___23.4.6", "product_id": "CSAFPID-1674646", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___24.2.0", "product": { "name": "communications___24.2.0", "product_id": "CSAFPID-1674644", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___7.2.1.0.0", "product": { "name": "communications___7.2.1.0.0", "product_id": "CSAFPID-1670441", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.6", "product": { "name": "communications___8.6.0.6", "product_id": "CSAFPID-1635327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.8", "product": { "name": "communications___8.6.0.8", "product_id": "CSAFPID-1635328", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.2", "product": { "name": "communications___9.0.2", "product_id": "CSAFPID-1670440", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.3", "product": { "name": "communications___9.0.3", "product_id": "CSAFPID-1635329", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.1.1.8.0", "product": { "name": "communications___9.1.1.8.0", "product_id": "CSAFPID-1674643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674621", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674618", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674619", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674617", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674620", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___12.0.6.0.0", "product": { "name": "communications_applications___12.0.6.0.0", "product_id": "CSAFPID-1674627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___5.5.22", "product": { "name": "communications_applications___5.5.22", "product_id": "CSAFPID-1674626", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.3", "product": { "name": "communications_applications___6.0.3", "product_id": "CSAFPID-1674628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.4", "product": { "name": "communications_applications___6.0.4", "product_id": "CSAFPID-1674624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.5", "product": { "name": "communications_applications___6.0.5", "product_id": "CSAFPID-1674625", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-204629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-1673475", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-764735", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-1650734", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-204639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-204627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-816793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-912557", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management__-_elastic_charging_engine", "product": { "name": "communications_billing_and_revenue_management__-_elastic_charging_engine", "product_id": "CSAFPID-219835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-764247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-41194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-1650820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-765241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-498607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-912556", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_calendar_server", "product": { "name": "communications_calendar_server", "product_id": "CSAFPID-764736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_calendar_server", "product": { "name": "communications_calendar_server", "product_id": "CSAFPID-220190", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_configuration_console", "product": { "name": "communications_cloud_native_configuration_console", "product_id": "CSAFPID-391501", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_configuration_console", "product": { "name": "communications_cloud_native_configuration_console", "product_id": "CSAFPID-440102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-89545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-180215", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-180197", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-41516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-41515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220057", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220055", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1503577", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673416", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673411", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764237", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-2045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-40612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-608629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-93784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1899", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-41111", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1685", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-493445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-294401", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-220547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764824", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-220459", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45184", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45181", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611403", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1650752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1673396", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-912066", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1503323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673526", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673391", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-165550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-93546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-180195", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-40299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-187447", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-45186", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-45185", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-220559", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-220558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-764238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-764239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816769", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-912085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1503578", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673389", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673421", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673420", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-764825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-912068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-1503579", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-180201", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1900", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-760687", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-40947", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-93635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-503534", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-90018", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-220327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-94290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-220325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-614513", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-643776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-816772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-912076", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1503580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40613", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-2044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40301", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-180194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-449747", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40298", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-223527", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-449746", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-503493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-260394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-219838", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-611387", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-618156", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-816773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912101", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1673473", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1503581", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912539", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912540", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912541", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912542", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912543", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-40611", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-40609", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-180198", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-41112", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-41110", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-760688", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-493444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-93633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220056", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-223511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-216017", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220918", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614514", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816346", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912077", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1503322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673415", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-40608", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-180199", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-41113", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-260395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-260393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816348", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-912545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816347", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673494", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673501", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-764240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-220468", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-2310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-93547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-180200", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-180193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1898", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-93636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-90020", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-90015", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-220133", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1650751", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-912069", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-765371", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-180216", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-180202", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-40300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-93653", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-40949", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-642000", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-93634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-90021", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-218028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220910", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-611401", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-816778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-614517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673392", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1503582", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-40610", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-611587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-642002", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-493443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-642001", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503583", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503585", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1672767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-180217", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-180196", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-165576", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-40297", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764899", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-589926", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-179780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-40948", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-589925", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-179779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90019", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90016", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-220326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816349", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1673399", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-764737", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-224787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-220189", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-764827", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-764828", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server_-_service_controller", "product": { "name": "communications_converged_application_server_-_service_controller", "product_id": "CSAFPID-764734", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server_-_service_controller", "product": { "name": "communications_converged_application_server_-_service_controller", "product_id": "CSAFPID-426842", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503599", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-345031", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-204635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-764833", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-224793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-816794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-342793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1650777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-764248", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-816350", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1261", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-110244", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-110242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-93777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-1672764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-93772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_data_model", "product": { "name": "communications_data_model", "product_id": "CSAFPID-764902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-765372", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-342799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704411", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-165544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704410", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-41183", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_intelligence_hub", "product": { "name": "communications_diameter_intelligence_hub", "product_id": "CSAFPID-342802", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_intelligence_hub", "product": { "name": "communications_diameter_intelligence_hub", "product_id": "CSAFPID-764829", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1503588", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1892", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1891", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1888", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1887", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1884", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1885", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1882", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1883", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1879", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1880", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-40293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1650826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1650830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-611413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912551", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912552", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_application_processor", "product": { "name": "communications_eagle_application_processor", "product_id": "CSAFPID-1673417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_application_processor", "product": { "name": "communications_eagle_application_processor", "product_id": "CSAFPID-765369", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-204528", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_ftp_table_base_retrieval", "product": { "name": "communications_eagle_ftp_table_base_retrieval", "product_id": "CSAFPID-204623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_lnp_application_processor", "product": { "name": "communications_eagle_lnp_application_processor", "product_id": "CSAFPID-352633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_lnp_application_processor", "product": { "name": "communications_eagle_lnp_application_processor", "product_id": "CSAFPID-352632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_software", "product": { "name": "communications_eagle_software", "product_id": "CSAFPID-765366", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_software", "product": { "name": "communications_eagle_software", "product_id": "CSAFPID-765365", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_elastic_charging_engine", "product": { "name": "communications_elastic_charging_engine", "product_id": "CSAFPID-764834", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-764242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-9226", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-9070", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-8845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-2286", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204464", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-345038", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-93629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-611422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-93630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-816780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_evolved_communications_application_server", "product": { "name": "communications_evolved_communications_application_server", "product_id": "CSAFPID-204645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-912553", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-207586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-234306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-219803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-387664", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_interactive_session_recorder", "product": { "name": "communications_interactive_session_recorder", "product_id": "CSAFPID-1893", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-204622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-219909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_lsms", "product": { "name": "communications_lsms", "product_id": "CSAFPID-1673065", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-764835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-375182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-816351", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-41182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-611595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-226017", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-220167", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816353", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-764243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816352", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1673414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816783", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816786", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816785", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816788", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-342803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1650778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-764249", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-816354", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-204563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-220125", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-245244", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-219776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-204554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-765242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-9489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-110249", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-93781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-220132", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-912079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-219898", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-221118", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-179774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-1673496", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence", "product": { "name": "communications_performance_intelligence", "product_id": "CSAFPID-1503591", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center", "product": { "name": "communications_performance_intelligence_center", "product_id": "CSAFPID-1673485", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-765367", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-765368", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-764830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-573035", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-45192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-611406", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-764738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-204595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-204590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-816355", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816359", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816358", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816357", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-912558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503602", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816797", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_services_gatekeeper", "product": { "name": "communications_services_gatekeeper", "product_id": "CSAFPID-608630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503592", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503593", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1672762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503594", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-342804", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-704413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2296", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-166028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2288", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2282", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2285", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2279", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-204634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-345039", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-93628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-611423", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-93631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-816791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-342805", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-704414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-166027", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2295", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2289", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2287", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2283", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2284", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2280", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2281", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-220414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-204607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_router", "product": { "name": "communications_session_router", "product_id": "CSAFPID-764780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_router", "product": { "name": "communications_session_router", "product_id": "CSAFPID-764781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_subscriber-aware_load_balancer", "product": { "name": "communications_subscriber-aware_load_balancer", "product_id": "CSAFPID-93775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_subscriber-aware_load_balancer", "product": { "name": "communications_subscriber-aware_load_balancer", "product_id": "CSAFPID-93774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-240600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78763", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673070", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673381", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1650731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673530", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-764901", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-614089", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-764739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204614", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-8984", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-219826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-912073", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_session_manager", "product": { "name": "communications_unified_session_manager", "product_id": "CSAFPID-110243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_session_manager", "product": { "name": "communications_unified_session_manager", "product_id": "CSAFPID-205759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503596", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503598", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-764900", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-76994", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-568240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-764782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-355340", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-912080", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1673481", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-912554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-611408", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-703515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-611407", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-204456", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37137", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-41182", "CSAFPID-209546", "CSAFPID-40608", "CSAFPID-180216", "CSAFPID-93547", "CSAFPID-180217", "CSAFPID-2310", "CSAFPID-40612", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-1899", "CSAFPID-41111", "CSAFPID-40299", "CSAFPID-187447", "CSAFPID-1900", "CSAFPID-40301", "CSAFPID-180194", "CSAFPID-40298", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-40300", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-40294", "CSAFPID-110243", "CSAFPID-204629", "CSAFPID-765241", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-41183", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-1893", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-204456", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-204645", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180196", "CSAFPID-180201", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-764739", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204635", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673381", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2021-37137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-41182", "CSAFPID-209546", "CSAFPID-40608", "CSAFPID-180216", "CSAFPID-93547", "CSAFPID-180217", "CSAFPID-2310", "CSAFPID-40612", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-1899", "CSAFPID-41111", "CSAFPID-40299", "CSAFPID-187447", "CSAFPID-1900", "CSAFPID-40301", "CSAFPID-180194", "CSAFPID-40298", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-40300", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-40294", "CSAFPID-110243", "CSAFPID-204629", "CSAFPID-765241", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-41183", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-1893", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-204456", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-204645", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180196", "CSAFPID-180201", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-764739", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204635", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673381", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2021-37137" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-40949", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-764735", "CSAFPID-204635", "CSAFPID-41183", "CSAFPID-234306", "CSAFPID-41182", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-764738", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-220547", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-93636", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-2068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-40949", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-764735", "CSAFPID-204635", "CSAFPID-41183", "CSAFPID-234306", "CSAFPID-41182", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-764738", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-220547", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-93636", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2601", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-2601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-2601" }, { "cve": "CVE-2022-23437", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-704410", "CSAFPID-704411", "CSAFPID-704412", "CSAFPID-226017", "CSAFPID-179774", "CSAFPID-219898", "CSAFPID-219826", "CSAFPID-204569", "CSAFPID-204510", "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-220548", "CSAFPID-608629", "CSAFPID-93784", "CSAFPID-41111", "CSAFPID-1685", "CSAFPID-493445", "CSAFPID-294401", "CSAFPID-220547", "CSAFPID-764824", "CSAFPID-220459", "CSAFPID-764825", "CSAFPID-93635", "CSAFPID-503534", "CSAFPID-503493", "CSAFPID-493444", "CSAFPID-93633", "CSAFPID-260395", "CSAFPID-260393", "CSAFPID-220468", "CSAFPID-93636", "CSAFPID-93634", "CSAFPID-589926", "CSAFPID-179780", "CSAFPID-589925", "CSAFPID-179779", "CSAFPID-764826", "CSAFPID-764827", "CSAFPID-764828", "CSAFPID-764829", "CSAFPID-764830", "CSAFPID-220190", "CSAFPID-220189", "CSAFPID-764833", "CSAFPID-41183", "CSAFPID-764834", "CSAFPID-234306", "CSAFPID-764835", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-40949", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-204635", "CSAFPID-41182", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-1899", "CSAFPID-40299", "CSAFPID-1900", "CSAFPID-180194", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-110243", "CSAFPID-765241", "CSAFPID-209546", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180217", "CSAFPID-180196", "CSAFPID-40612", "CSAFPID-180201", "CSAFPID-180216", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-40608", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-2310", "CSAFPID-93547", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673065", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-23437", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json" } ], "title": "CVE-2022-23437" }, { "cve": "CVE-2022-36760", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-704412", "CSAFPID-704411", "CSAFPID-704410", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-704412", "CSAFPID-704411", "CSAFPID-704410", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-36760" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2953", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3635", "cwe": { "id": "CWE-195", "name": "Signed to Unsigned Conversion Error" }, "notes": [ { "category": "other", "text": "Signed to Unsigned Conversion Error", "title": "CWE-195" }, { "category": "other", "text": "Uncaught Exception", "title": "CWE-248" } ], "product_status": { "known_affected": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-204622", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-219909", "CSAFPID-220558", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611401", "CSAFPID-611406", "CSAFPID-611407", "CSAFPID-611408", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-614513", "CSAFPID-614514", "CSAFPID-614515", "CSAFPID-614516", "CSAFPID-614517", "CSAFPID-618156", "CSAFPID-643776", "CSAFPID-764237", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-764240", "CSAFPID-764241", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-764249", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242" ] }, "references": [ { "category": "self", "summary": "CVE-2023-3635", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-204622", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-219909", "CSAFPID-220558", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611401", "CSAFPID-611406", "CSAFPID-611407", "CSAFPID-611408", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-614513", "CSAFPID-614514", "CSAFPID-614515", "CSAFPID-614516", "CSAFPID-614517", "CSAFPID-618156", "CSAFPID-643776", "CSAFPID-764237", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-764240", "CSAFPID-764241", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-764249", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242" ] } ], "title": "CVE-2023-3635" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816352", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-342804", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-224793", "CSAFPID-816794", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342803", "CSAFPID-611595", "CSAFPID-764738", "CSAFPID-816351", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-912073", "CSAFPID-912558" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816352", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-342804", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-224793", "CSAFPID-816794", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342803", "CSAFPID-611595", "CSAFPID-764738", "CSAFPID-816351", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-912073", "CSAFPID-912558" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-6597", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "other", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6597", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2023-6597" }, { "cve": "CVE-2023-6816", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-45182", "CSAFPID-40293", "CSAFPID-611406", "CSAFPID-764237", "CSAFPID-220558", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-614513", "CSAFPID-643776", "CSAFPID-611387", "CSAFPID-618156", "CSAFPID-614516", "CSAFPID-614515", "CSAFPID-614514", "CSAFPID-764240", "CSAFPID-94291", "CSAFPID-611401", "CSAFPID-614517", "CSAFPID-764241", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-342804", "CSAFPID-611408", "CSAFPID-611407", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-611595", "CSAFPID-764249", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-38408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-45182", "CSAFPID-40293", "CSAFPID-611406", "CSAFPID-764237", "CSAFPID-220558", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-614513", "CSAFPID-643776", "CSAFPID-611387", "CSAFPID-618156", "CSAFPID-614516", "CSAFPID-614515", "CSAFPID-614514", "CSAFPID-764240", "CSAFPID-94291", "CSAFPID-611401", "CSAFPID-614517", "CSAFPID-764241", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-342804", "CSAFPID-611408", "CSAFPID-611407", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-611595", "CSAFPID-764249", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-38408" }, { "cve": "CVE-2023-43642", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673395", "CSAFPID-94291", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797" ] }, "references": [ { "category": "self", "summary": "CVE-2023-43642", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673395", "CSAFPID-94291", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797" ] } ], "title": "CVE-2023-43642" }, { "cve": "CVE-2023-46136", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673411", "CSAFPID-912549", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-220132", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673411", "CSAFPID-912549", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-220132", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-46136" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816352", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-219803", "CSAFPID-816351", "CSAFPID-611595", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673417", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-90016", "CSAFPID-764826", "CSAFPID-345038", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-93781", "CSAFPID-345039", "CSAFPID-912080", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-611413", "CSAFPID-240600", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816352", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-219803", "CSAFPID-816351", "CSAFPID-611595", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673417", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-90016", "CSAFPID-764826", "CSAFPID-345038", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-93781", "CSAFPID-345039", "CSAFPID-912080", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-611413", "CSAFPID-240600", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912102", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912102", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2023-52428" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "product_status": { "known_affected": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2398", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1650731", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650731", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-5971", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673526", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673526", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-5971" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-6387", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Signal Handler Race Condition", "title": "CWE-364" } ], "product_status": { "known_affected": [ "CSAFPID-1503595", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json" } ], "title": "CVE-2024-6387" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-912101", "CSAFPID-1673473", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-912101", "CSAFPID-1673473", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673475", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-224795", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673475", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-224795", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650820", "CSAFPID-1650751", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650820", "CSAFPID-1650751", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "other", "text": "Incomplete Cleanup", "title": "CWE-459" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650734", "CSAFPID-1650830", "CSAFPID-1650777", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-1650778", "CSAFPID-41182", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650734", "CSAFPID-1650830", "CSAFPID-1650777", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-1650778", "CSAFPID-41182", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1650752", "CSAFPID-1673481", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1650752", "CSAFPID-1673481", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25638", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25638", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-25638" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1673485", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673389", "CSAFPID-1672767", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673415", "CSAFPID-1673390", "CSAFPID-1673413", "CSAFPID-1673395", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1673485", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673389", "CSAFPID-1672767", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673415", "CSAFPID-1673390", "CSAFPID-1673413", "CSAFPID-1673395", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-29736", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-29736" }, { "cve": "CVE-2024-29857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1673413", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673413", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29857" }, { "cve": "CVE-2024-30251", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-30251" }, { "cve": "CVE-2024-31080", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json" } ], "title": "CVE-2024-31080" }, { "cve": "CVE-2024-31744", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31744", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-31744" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-38816" }, { "cve": "CVE-2024-39689", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673393" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39689", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673393" ] } ], "title": "CVE-2024-39689" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1673516", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673516", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-41817", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1674625" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1674625" ] } ], "title": "CVE-2024-41817" }, { "cve": "CVE-2024-43044", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673494", "CSAFPID-1673393", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673494", "CSAFPID-1673393", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-43044" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-45492" } ] }
gsd-2023-6816
Vulnerability from gsd
Modified
2023-12-14 06:01
Details
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-6816" ], "details": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "id": "GSD-2023-6816", "modified": "2023-12-14T06:01:34.603483Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-6816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat Enterprise Linux 7", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.20.4-27.el7_9", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.8.0-31.el7_9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-2.el8_9.7", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-6.el8_6.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-15.el8_8.7", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-3.el9_3.6", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-22.el9_0.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-14.el9_2.5", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 6", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "credits": [ { "lang": "en", "value": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-787", "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openwall.com/lists/oss-security/2024/01/18/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0320", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0557", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0558", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0597", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0607", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0614", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0617", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0621", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0626", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0629", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "name": "https://access.redhat.com/security/cve/CVE-2023-6816", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" }, { "name": "https://security.gentoo.org/glsa/202401-30", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/202401-30" }, { "name": "https://security.netapp.com/advisory/ntap-20240307-0006/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ] }, "work_around": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "565381E7-E0BD-408F-B970-34E9724B1B08", "versionEndExcluding": "21.1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FE48099-1D7F-444E-8F0C-FAB71F25AD71", "versionEndExcluding": "23.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor." } ], "id": "CVE-2023-6816", "lastModified": "2024-03-07T17:15:12.180", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2024-01-18T05:15:08.607", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/202401-30" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] } } } }
opensuse-su-2024:13597-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
xorg-x11-server-21.1.11-1.1 on GA media
Notes
Title of the patch
xorg-x11-server-21.1.11-1.1 on GA media
Description of the patch
These are all security issues fixed in the xorg-x11-server-21.1.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13597
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xorg-x11-server-21.1.11-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xorg-x11-server-21.1.11-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13597", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13597-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0408 page", "url": "https://www.suse.com/security/cve/CVE-2024-0408/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0409 page", "url": "https://www.suse.com/security/cve/CVE-2024-0409/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "xorg-x11-server-21.1.11-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13597-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.11-1.1.aarch64", "product": { "name": "xorg-x11-server-21.1.11-1.1.aarch64", "product_id": "xorg-x11-server-21.1.11-1.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "product": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.11-1.1.aarch64", "product": { "name": "xorg-x11-server-extra-21.1.11-1.1.aarch64", "product_id": "xorg-x11-server-extra-21.1.11-1.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.11-1.1.aarch64", "product": { "name": "xorg-x11-server-sdk-21.1.11-1.1.aarch64", "product_id": "xorg-x11-server-sdk-21.1.11-1.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.11-1.1.aarch64", "product": { "name": "xorg-x11-server-source-21.1.11-1.1.aarch64", "product_id": "xorg-x11-server-source-21.1.11-1.1.aarch64" } }, { "category": "product_version", "name": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "product": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "product_id": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.11-1.1.ppc64le", "product": { "name": "xorg-x11-server-21.1.11-1.1.ppc64le", "product_id": "xorg-x11-server-21.1.11-1.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.11-1.1.ppc64le", "product": { "name": "xorg-x11-server-extra-21.1.11-1.1.ppc64le", "product_id": "xorg-x11-server-extra-21.1.11-1.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "product": { "name": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "product_id": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.11-1.1.ppc64le", "product": { "name": "xorg-x11-server-source-21.1.11-1.1.ppc64le", "product_id": "xorg-x11-server-source-21.1.11-1.1.ppc64le" } }, { "category": "product_version", "name": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "product": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "product_id": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.11-1.1.s390x", "product": { "name": "xorg-x11-server-21.1.11-1.1.s390x", "product_id": "xorg-x11-server-21.1.11-1.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "product": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.11-1.1.s390x", "product": { "name": "xorg-x11-server-extra-21.1.11-1.1.s390x", "product_id": "xorg-x11-server-extra-21.1.11-1.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.11-1.1.s390x", "product": { "name": "xorg-x11-server-sdk-21.1.11-1.1.s390x", "product_id": "xorg-x11-server-sdk-21.1.11-1.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.11-1.1.s390x", "product": { "name": "xorg-x11-server-source-21.1.11-1.1.s390x", "product_id": "xorg-x11-server-source-21.1.11-1.1.s390x" } }, { "category": "product_version", "name": "xorg-x11-server-wrapper-21.1.11-1.1.s390x", "product": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.s390x", "product_id": "xorg-x11-server-wrapper-21.1.11-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-21.1.11-1.1.x86_64", "product": { "name": "xorg-x11-server-21.1.11-1.1.x86_64", "product_id": "xorg-x11-server-21.1.11-1.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "product": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-extra-21.1.11-1.1.x86_64", "product": { "name": "xorg-x11-server-extra-21.1.11-1.1.x86_64", "product_id": "xorg-x11-server-extra-21.1.11-1.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-sdk-21.1.11-1.1.x86_64", "product": { "name": "xorg-x11-server-sdk-21.1.11-1.1.x86_64", "product_id": "xorg-x11-server-sdk-21.1.11-1.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-source-21.1.11-1.1.x86_64", "product": { "name": "xorg-x11-server-source-21.1.11-1.1.x86_64", "product_id": "xorg-x11-server-source-21.1.11-1.1.x86_64" } }, { "category": "product_version", "name": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64", "product": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64", "product_id": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64" }, "product_reference": "xorg-x11-server-21.1.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le" }, "product_reference": "xorg-x11-server-21.1.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x" }, "product_reference": "xorg-x11-server-21.1.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64" }, "product_reference": "xorg-x11-server-21.1.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x" }, "product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64" }, "product_reference": "xorg-x11-server-extra-21.1.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le" }, "product_reference": "xorg-x11-server-extra-21.1.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x" }, "product_reference": "xorg-x11-server-extra-21.1.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-extra-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64" }, "product_reference": "xorg-x11-server-extra-21.1.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64" }, "product_reference": "xorg-x11-server-sdk-21.1.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le" }, "product_reference": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x" }, "product_reference": "xorg-x11-server-sdk-21.1.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-sdk-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64" }, "product_reference": "xorg-x11-server-sdk-21.1.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64" }, "product_reference": "xorg-x11-server-source-21.1.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le" }, "product_reference": "xorg-x11-server-source-21.1.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x" }, "product_reference": "xorg-x11-server-source-21.1.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64" }, "product_reference": "xorg-x11-server-source-21.1.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64" }, "product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le" }, "product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x" }, "product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" }, "product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-0408", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0408" } ], "notes": [ { "category": "general", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0408", "url": "https://www.suse.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "SUSE Bug 1218845 for CVE-2024-0408", "url": "https://bugzilla.suse.com/1218845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-0408" }, { "cve": "CVE-2024-0409", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0409" } ], "notes": [ { "category": "general", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0409", "url": "https://www.suse.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "SUSE Bug 1218846 for CVE-2024-0409", "url": "https://bugzilla.suse.com/1218846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-0409" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x", "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
opensuse-su-2024:13598-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
xwayland-23.2.4-1.1 on GA media
Notes
Title of the patch
xwayland-23.2.4-1.1 on GA media
Description of the patch
These are all security issues fixed in the xwayland-23.2.4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13598
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xwayland-23.2.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xwayland-23.2.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13598", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13598-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6816 page", "url": "https://www.suse.com/security/cve/CVE-2023-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0229 page", "url": "https://www.suse.com/security/cve/CVE-2024-0229/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0408 page", "url": "https://www.suse.com/security/cve/CVE-2024-0408/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0409 page", "url": "https://www.suse.com/security/cve/CVE-2024-0409/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21885 page", "url": "https://www.suse.com/security/cve/CVE-2024-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21886 page", "url": "https://www.suse.com/security/cve/CVE-2024-21886/" } ], "title": "xwayland-23.2.4-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13598-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xwayland-23.2.4-1.1.aarch64", "product": { "name": "xwayland-23.2.4-1.1.aarch64", "product_id": "xwayland-23.2.4-1.1.aarch64" } }, { "category": "product_version", "name": "xwayland-devel-23.2.4-1.1.aarch64", "product": { "name": "xwayland-devel-23.2.4-1.1.aarch64", "product_id": "xwayland-devel-23.2.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xwayland-23.2.4-1.1.ppc64le", "product": { "name": "xwayland-23.2.4-1.1.ppc64le", "product_id": "xwayland-23.2.4-1.1.ppc64le" } }, { "category": "product_version", "name": "xwayland-devel-23.2.4-1.1.ppc64le", "product": { "name": "xwayland-devel-23.2.4-1.1.ppc64le", "product_id": "xwayland-devel-23.2.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xwayland-23.2.4-1.1.s390x", "product": { "name": "xwayland-23.2.4-1.1.s390x", "product_id": "xwayland-23.2.4-1.1.s390x" } }, { "category": "product_version", "name": "xwayland-devel-23.2.4-1.1.s390x", "product": { "name": "xwayland-devel-23.2.4-1.1.s390x", "product_id": "xwayland-devel-23.2.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xwayland-23.2.4-1.1.x86_64", "product": { "name": "xwayland-23.2.4-1.1.x86_64", "product_id": "xwayland-23.2.4-1.1.x86_64" } }, { "category": "product_version", "name": "xwayland-devel-23.2.4-1.1.x86_64", "product": { "name": "xwayland-devel-23.2.4-1.1.x86_64", "product_id": "xwayland-devel-23.2.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xwayland-23.2.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64" }, "product_reference": "xwayland-23.2.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-23.2.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le" }, "product_reference": "xwayland-23.2.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-23.2.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x" }, "product_reference": "xwayland-23.2.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-23.2.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64" }, "product_reference": "xwayland-23.2.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-23.2.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64" }, "product_reference": "xwayland-devel-23.2.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-23.2.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le" }, "product_reference": "xwayland-devel-23.2.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-23.2.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x" }, "product_reference": "xwayland-devel-23.2.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xwayland-devel-23.2.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" }, "product_reference": "xwayland-devel-23.2.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6816" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6816", "url": "https://www.suse.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "SUSE Bug 1218582 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1218582" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2023-6816", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0229" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0229", "url": "https://www.suse.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "SUSE Bug 1218583 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1218583" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-0229", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-0229" }, { "cve": "CVE-2024-0408", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0408" } ], "notes": [ { "category": "general", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0408", "url": "https://www.suse.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "SUSE Bug 1218845 for CVE-2024-0408", "url": "https://bugzilla.suse.com/1218845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-0408" }, { "cve": "CVE-2024-0409", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0409" } ], "notes": [ { "category": "general", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0409", "url": "https://www.suse.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "SUSE Bug 1218846 for CVE-2024-0409", "url": "https://bugzilla.suse.com/1218846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-0409" }, { "cve": "CVE-2024-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21885" } ], "notes": [ { "category": "general", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21885", "url": "https://www.suse.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "SUSE Bug 1218584 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1218584" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21885", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21886" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21886", "url": "https://www.suse.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "SUSE Bug 1218585 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1218585" }, { "category": "external", "summary": "SUSE Bug 1221590 for CVE-2024-21886", "url": "https://bugzilla.suse.com/1221590" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x", "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-21886" } ] }
wid-sec-w-2024-0127
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2025-08-04 22:00
Summary
X.Org X11: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das X Window System dient der Erzeugung grafischer Oberflächen auf Unix Systemen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0127 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0127.json" }, { "category": "self", "summary": "WID-SEC-2024-0127 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0127" }, { "category": "external", "summary": "X.Org Security Advisory vom 2024-01-16", "url": "https://lists.x.org/archives/xorg/2024-January/061525.html" }, { "category": "external", "summary": "Xming Changes vom 2024-01-16", "url": "http://www.straightrunning.com/XmingNotes/changes.php" }, { "category": "external", "summary": "Ubuntu Security Advisory vom 2024-01-16", "url": "https://ubuntu.com/security/notices/USN-6587-1" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-05db4bcbec" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-da3d410b53" }, { "category": "external", "summary": "OpenBSD Patch vom 2024-01-16", "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/012_xserver.patch.sig" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0111-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0116-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5762D637DD vom 2024-01-18", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5762d637dd" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0121-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0114-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0109-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-2815D55CDF vom 2024-01-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2815d55cdf" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0165-1 vom 2024-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0320 vom 2024-01-22", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0320 vom 2024-01-23", "url": "https://linux.oracle.com/errata/ELSA-2024-0320.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-2 vom 2024-01-22", "url": "https://ubuntu.com/security/notices/USN-6587-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-5603 vom 2024-01-23", "url": "https://lists.debian.org/debian-security-announce/2024/msg00010.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0212-1 vom 2024-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0236-1 vom 2024-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3721 vom 2024-01-25", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2024:0320 vom 2024-01-26", "url": "https://lists.centos.org/pipermail/centos-announce/2024-January/099216.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0249-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0251-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0252-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0558 vom 2024-01-30", "url": "http://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0597 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0557 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0614 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0607 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-3 vom 2024-01-30", "url": "https://ubuntu.com/security/notices/USN-6587-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0617 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0621 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0626 vom 2024-01-31", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202401-30 vom 2024-01-31", "url": "https://security.gentoo.org/glsa/202401-30" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0557 vom 2024-01-31", "url": "https://linux.oracle.com/errata/ELSA-2024-0557.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0629 vom 2024-01-31", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0607 vom 2024-02-01", "url": "http://linux.oracle.com/errata/ELSA-2024-0607.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0629 vom 2024-02-01", "url": "https://linux.oracle.com/errata/ELSA-2024-0629.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-4 vom 2024-02-01", "url": "https://ubuntu.com/security/notices/USN-6587-4" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2024:0629 vom 2024-02-05", "url": "https://lists.centos.org/pipermail/centos-announce/2024-February/099223.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:0607 vom 2024-02-12", "url": "https://errata.build.resf.org/RLSA-2024:0607" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2455 vom 2024-02-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2455.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-5 vom 2024-03-13", "url": "https://ubuntu.com/security/notices/USN-6587-5" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2037 vom 2024-04-25", "url": "http://linux.oracle.com/errata/ELSA-2024-2037.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2080 vom 2024-04-30", "url": "https://linux.oracle.com/errata/ELSA-2024-2080.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2169 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2995 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2995" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2996 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1932 vom 2024-06-28", "url": "https://alas.aws.amazon.com/ALAS-2024-1932.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2861 vom 2025-04-01", "url": "https://linux.oracle.com/errata/ELSA-2025-2861.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12751 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12751" } ], "source_lang": "en-US", "title": "X.Org X11: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:19:26.027+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-0127", "initial_release_date": "2024-01-16T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE und Fedora aufgenommen" }, { "date": "2024-01-18T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-01-21T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-01-24T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2024-01-28T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von CentOS und SUSE aufgenommen" }, { "date": "2024-01-29T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-01-31T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Gentoo, Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-02-01T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2024-02-12T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-13T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-30T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-31T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "23" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c21.1.11", "product": { "name": "Open Source X.Org X11 \u003c21.1.11", "product_id": "T032211" } }, { "category": "product_version", "name": "21.1.11", "product": { "name": "Open Source X.Org X11 21.1.11", "product_id": "T032211-fixed", "product_identification_helper": { "cpe": "cpe:/a:x:x.org_x11:21.1.11" } } }, { "category": "product_version_range", "name": "\u003cXWayland 23.2.4", "product": { "name": "Open Source X.Org X11 \u003cXWayland 23.2.4", "product_id": "T032212" } }, { "category": "product_version", "name": "XWayland 23.2.4", "product": { "name": "Open Source X.Org X11 XWayland 23.2.4", "product_id": "T032212-fixed", "product_identification_helper": { "cpe": "cpe:/a:x:x.org_x11:xwayland_23.2.4" } } } ], "category": "product_name", "name": "X.Org X11" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "OpenBSD OpenBSD", "product": { "name": "OpenBSD OpenBSD", "product_id": "T024283", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openbsd:-" } } } ], "category": "vendor", "name": "OpenBSD" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } }, { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T016400", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "product_status": { "known_affected": [ "T024283", "T032212", "67646", "T012167", "T004914", "T016400", "T032255", "T032211", "74185", "2951", "T002207", "T000126", "398363", "1727" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "product_status": { "known_affected": [ "T024283", "T032212", "67646", "T012167", "T004914", "T016400", "T032255", "T032211", "74185", "2951", "T002207", "T000126", "398363", "1727" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2024-0229" }, { "cve": "CVE-2024-0408", "product_status": { "known_affected": [ "T024283", "T032212", "67646", "T012167", "T004914", "T016400", "T032255", "T032211", "74185", "2951", "T002207", "T000126", "398363", "1727" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2024-0408" }, { "cve": "CVE-2024-0409", "product_status": { "known_affected": [ "T024283", "T032212", "67646", "T012167", "T004914", "T016400", "T032255", "T032211", "74185", "2951", "T002207", "T000126", "398363", "1727" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2024-0409" }, { "cve": "CVE-2024-21885", "product_status": { "known_affected": [ "T024283", "T032212", "67646", "T012167", "T004914", "T016400", "T032255", "T032211", "74185", "2951", "T002207", "T000126", "398363", "1727" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "product_status": { "known_affected": [ "T024283", "T032212", "67646", "T012167", "T004914", "T016400", "T032255", "T032211", "74185", "2951", "T002207", "T000126", "398363", "1727" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2024-21886" } ] }
wid-sec-w-2024-3195
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-10-15 22:00
Summary
Oracle Communications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Communications umfasst branchenspezifische Lösungen für die Telekommunikationsbranche.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3195 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3195.json" }, { "category": "self", "summary": "WID-SEC-2024-3195 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3195" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Communications vom 2024-10-15", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixCGBU" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-10-15T22:00:00.000+00:00", "generator": { "date": "2024-10-16T10:12:35.400+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-3195", "initial_release_date": "2024-10-15T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.1.1.3.0", "product": { "name": "Oracle Communications 9.1.1.3.0", "product_id": "T027333", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.3.0" } } }, { "category": "product_version", "name": "12.6.1.0.0", "product": { "name": "Oracle Communications 12.6.1.0.0", "product_id": "T027338", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.1.0.0" } } }, { "category": "product_version", "name": "5.1", "product": { "name": "Oracle Communications 5.1", "product_id": "T028684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.1" } } }, { "category": "product_version", "name": "15.0.0.0.0", "product": { "name": "Oracle Communications 15.0.0.0.0", "product_id": "T032090", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.0.0.0" } } }, { "category": "product_version", "name": "23.4.0", "product": { "name": "Oracle Communications 23.4.0", "product_id": "T032091", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.0" } } }, { "category": "product_version", "name": "23.4.2", "product": { "name": "Oracle Communications 23.4.2", "product_id": "T034144", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.2" } } }, { "category": "product_version", "name": "24.1.0", "product": { "name": "Oracle Communications 24.1.0", "product_id": "T034145", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0" } } }, { "category": "product_version", "name": "5.2", "product": { "name": "Oracle Communications 5.2", "product_id": "T034146", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.2" } } }, { "category": "product_version", "name": "24.1.0.0.0", "product": { "name": "Oracle Communications 24.1.0.0.0", "product_id": "T034147", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0.0.0" } } }, { "category": "product_version", "name": "23.4.3", "product": { "name": "Oracle Communications 23.4.3", "product_id": "T036195", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.3" } } }, { "category": "product_version", "name": "23.4.4", "product": { "name": "Oracle Communications 23.4.4", "product_id": "T036196", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.4" } } }, { "category": "product_version_range", "name": "\u003c=24.2.0", "product": { "name": "Oracle Communications \u003c=24.2.0", "product_id": "T036197" } }, { "category": "product_version_range", "name": "\u003c=24.2.0", "product": { "name": "Oracle Communications \u003c=24.2.0", "product_id": "T036197-fixed" } }, { "category": "product_version", "name": "4.1.0", "product": { "name": "Oracle Communications 4.1.0", "product_id": "T036205", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.1.0" } } }, { "category": "product_version", "name": "4.2.0", "product": { "name": "Oracle Communications 4.2.0", "product_id": "T036206", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.2.0" } } }, { "category": "product_version", "name": "9.2.0", "product": { "name": "Oracle Communications 9.2.0", "product_id": "T036207", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.2.0" } } }, { "category": "product_version", "name": "9.3.0", "product": { "name": "Oracle Communications 9.3.0", "product_id": "T036208", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.3.0" } } }, { "category": "product_version", "name": "12.11.0", "product": { "name": "Oracle Communications 12.11.0", "product_id": "T036209", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.0" } } }, { "category": "product_version", "name": "9.0.1.10.0", "product": { "name": "Oracle Communications 9.0.1.10.0", "product_id": "T038373", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.1.10.0" } } }, { "category": "product_version_range", "name": "\u003c=23.4.5", "product": { "name": "Oracle Communications \u003c=23.4.5", "product_id": "T038375" } }, { "category": "product_version_range", "name": "\u003c=23.4.5", "product": { "name": "Oracle Communications \u003c=23.4.5", "product_id": "T038375-fixed" } }, { "category": "product_version", "name": "24.2.1", "product": { "name": "Oracle Communications 24.2.1", "product_id": "T038376", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.1" } } }, { "category": "product_version_range", "name": "\u003c=23.4.6", "product": { "name": "Oracle Communications \u003c=23.4.6", "product_id": "T038377" } }, { "category": "product_version_range", "name": "\u003c=23.4.6", "product": { "name": "Oracle Communications \u003c=23.4.6", "product_id": "T038377-fixed" } }, { "category": "product_version", "name": "24.1.1", "product": { "name": "Oracle Communications 24.1.1", "product_id": "T038378", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.1" } } }, { "category": "product_version", "name": "24.2.2", "product": { "name": "Oracle Communications 24.2.2", "product_id": "T038379", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.2" } } }, { "category": "product_version", "name": "9.1.5", "product": { "name": "Oracle Communications 9.1.5", "product_id": "T038380", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.5" } } }, { "category": "product_version", "name": "9.1.0", "product": { "name": "Oracle Communications 9.1.0", "product_id": "T038381", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.0" } } }, { "category": "product_version", "name": "14", "product": { "name": "Oracle Communications 14.0", "product_id": "T038382", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:14.0" } } }, { "category": "product_version", "name": "9.1.1.9.0", "product": { "name": "Oracle Communications 9.1.1.9.0", "product_id": "T038383", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.9.0" } } }, { "category": "product_version", "name": "14.0.0.1", "product": { "name": "Oracle Communications 14.0.0.1", "product_id": "T038384", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:14.0.0.1" } } }, { "category": "product_version", "name": "17.0.1", "product": { "name": "Oracle Communications 17.0.1", "product_id": "T038385", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:17.0.1" } } }, { "category": "product_version_range", "name": "\u003c10.4.0.4", "product": { "name": "Oracle Communications \u003c10.4.0.4", "product_id": "T038386" } }, { "category": "product_version", "name": "10.4.0.4", "product": { "name": "Oracle Communications 10.4.0.4", "product_id": "T038386-fixed", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.4.0.4" } } }, { "category": "product_version_range", "name": "\u003c=9.1.1.8.0", "product": { "name": "Oracle Communications \u003c=9.1.1.8.0", "product_id": "T038426" } }, { "category": "product_version_range", "name": "\u003c=9.1.1.8.0", "product": { "name": "Oracle Communications \u003c=9.1.1.8.0", "product_id": "T038426-fixed" } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-2601", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-2601" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2023-2953", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-38408", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-38408" }, { "cve": "CVE-2023-4043", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-4043" }, { "cve": "CVE-2023-46136", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-46136" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-51775" }, { "cve": "CVE-2023-5685", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-5685" }, { "cve": "CVE-2023-6597", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-6597" }, { "cve": "CVE-2023-6816", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0450", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-22020", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22257", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-23672" }, { "cve": "CVE-2024-2398", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-2398" }, { "cve": "CVE-2024-25062", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25638", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-25638" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-26308" }, { "cve": "CVE-2024-28182", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29736", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-29736" }, { "cve": "CVE-2024-29857", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-29857" }, { "cve": "CVE-2024-30251", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-30251" }, { "cve": "CVE-2024-31080", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-31080" }, { "cve": "CVE-2024-31744", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-31744" }, { "cve": "CVE-2024-32760", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-32760" }, { "cve": "CVE-2024-33602", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-34750" }, { "cve": "CVE-2024-37371", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38816", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-38816" }, { "cve": "CVE-2024-40898", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-40898" }, { "cve": "CVE-2024-43044", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-43044" }, { "cve": "CVE-2024-45492", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-45492" }, { "cve": "CVE-2024-4577", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-4603" }, { "cve": "CVE-2024-5971", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-5971" }, { "cve": "CVE-2024-6162", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-6162" }, { "cve": "CVE-2024-6387", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-6387" }, { "cve": "CVE-2024-7254", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-7254" } ] }
ghsa-pcjv-393q-rqf2
Vulnerability from github
Published
2024-01-18 06:30
Modified
2025-08-04 21:30
Severity ?
VLAI Severity ?
Details
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
{ "affected": [], "aliases": [ "CVE-2023-6816" ], "database_specific": { "cwe_ids": [ "CWE-119", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-01-18T05:15:08Z", "severity": "HIGH" }, "details": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "id": "GHSA-pcjv-393q-rqf2", "modified": "2025-08-04T21:30:36Z", "published": "2024-01-18T06:30:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240307-0006" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202401-30" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2023-6816
Vulnerability from fkie_nvd
Published
2024-01-18 05:15
Modified
2025-08-04 21:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0320 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0557 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0558 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0597 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0607 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0614 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0617 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0621 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0626 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0629 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2169 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2170 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2996 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12751 | ||
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-6816 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2257691 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/01/18/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0320 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0557 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0597 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0607 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0614 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0617 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0621 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0626 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0629 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2169 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2170 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2996 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-6816 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2257691 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202401-30 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240307-0006/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
x.org | xorg-server | * | |
x.org | xwayland | * | |
fedoraproject | fedora | 39 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "565381E7-E0BD-408F-B970-34E9724B1B08", "versionEndExcluding": "21.1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FE48099-1D7F-444E-8F0C-FAB71F25AD71", "versionEndExcluding": "23.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor." } ], "id": "CVE-2023-6816", "lastModified": "2025-08-04T21:15:28.083", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-18T05:15:08.607", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202401-30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…