Risk | Low |
Patch available | YES |
Number of vulnerabilities | 15 |
CVE-ID | CVE-2021-4008 CVE-2021-4009 CVE-2021-4010 CVE-2021-4011 CVE-2022-3550 CVE-2022-3551 CVE-2022-3553 CVE-2022-4283 CVE-2022-46340 CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344 CVE-2023-0494 CVE-2023-1393 |
CWE-ID | CWE-787 CWE-119 CWE-401 CWE-416 CWE-121 CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Gentoo Linux Operating systems & Components / Operating system x11-base/xwayland Operating systems & Components / Operating system package or component x11-base/xorg-server Operating systems & Components / Operating system package or component |
Vendor | Gentoo |
Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU59045
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-4008
CWE-ID:
Exploit availability:
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the SProcRenderCompositeGlyphs() function in the Render extension. A local user can send a specially crafted CompositeGlyphs request, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU59046
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-4009
CWE-ID:
Exploit availability:
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the ProcXFixesCreatePointerBarrier() function in the XFixes extension. A local user can send a specially crafted CreatePointerBarrier request, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU59047
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-4010
CWE-ID:
Exploit availability:
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the SProcScreenSaverSuspend() function in the Screen Saver extension. A local user can send a specially crafted Suspend request, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU59048
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-4011
CWE-ID:
Exploit availability:
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the SwapCreateRegister() function in the Record extension. A local user can send a specially crafted RecordCreateContext and RecordRegisterClients requests, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68415
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-3550
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the _GetCountedString() function in xkb/xkb.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68416
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-3551
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak within the ProcXkbGetKbdByName() function in xkb/xkb.c. A local user can force the application to leak memory and perform denial of service attack.
MitigationUpdate the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68417
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-3553
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak within the xquartz component in hw/xquartz/X11Controller.m. A local user can force the application to leak memory and perform denial of service attack.
MitigationUpdate the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70438
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-4283
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70433
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46340
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the swap handler for the XTestFakeInput request of the XTest extension if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. A local user can trigger a stack-based buffer overflow and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70434
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46341
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when handling XIPassiveUngrab requests. A local user can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70435
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46342
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error when handling XvdiSelectVideoNotify requests. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70436
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46343
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The
vulnerability exists due to a use-after-free error when handling
ScreenSaverSetAttributes requests. A local user can trigger a
use-after-free error and execute arbitrary code with elevated
privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70437
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46344
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when handling XIChangeProperty requests. A local user can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU71991
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-0494
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within DeepCopyPointerClasses. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU74180
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-1393
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error when processing deletion of a compositor overlay window. A local user can trigger a use-after-free error and execute arbitrary code on the system.
Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1
Gentoo Linux: All versions
x11-base/xwayland: before 23.1.1
x11-base/xorg-server: before 21.1.8
Fixed software versionsCPE2.3 External links
http://security.gentoo.org/glsa/202305-30
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?