CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
73.8%
X.Org server is vulnerable to Out-of-bounds Write. The vulnerability is caused due to not allocating sufficient memory space for the devices’s particular number of logical buttons. This can lead to a heap overflow if a bigger value is used. DeviceFocusEvent
and the XIQueryPointer
reply of X.Org server contain a bit for each logical button currently down and buttons can be mapped to any value up to 255.
www.openwall.com/lists/oss-security/2024/01/18/1
access.redhat.com/errata/RHSA-2024:0320
access.redhat.com/errata/RHSA-2024:0557
access.redhat.com/errata/RHSA-2024:0558
access.redhat.com/errata/RHSA-2024:0597
access.redhat.com/errata/RHSA-2024:0607
access.redhat.com/errata/RHSA-2024:0614
access.redhat.com/errata/RHSA-2024:0617
access.redhat.com/errata/RHSA-2024:0621
access.redhat.com/errata/RHSA-2024:0626
access.redhat.com/errata/RHSA-2024:0629
access.redhat.com/errata/RHSA-2024:2169
access.redhat.com/errata/RHSA-2024:2170
access.redhat.com/errata/RHSA-2024:2996
access.redhat.com/security/cve/CVE-2023-6816
bugzilla.redhat.com/show_bug.cgi?id=2257691
lists.debian.org/debian-lts-announce/2024/01/msg00016.html
lists.fedoraproject.org/archives/list/[email protected]/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
lists.fedoraproject.org/archives/list/[email protected]/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
lists.fedoraproject.org/archives/list/[email protected]/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
security-tracker.debian.org/tracker/CVE-2023-6816
security.gentoo.org/glsa/202401-30
security.netapp.com/advisory/ntap-20240307-0006/