Gentoo update for X.Org X server, XWayland



Published: 2023-05-30
Risk Low
Patch available YES
Number of vulnerabilities 15
CVE-ID CVE-2021-4008
CVE-2021-4009
CVE-2021-4010
CVE-2021-4011
CVE-2022-3550
CVE-2022-3551
CVE-2022-3553
CVE-2022-4283
CVE-2022-46340
CVE-2022-46341
CVE-2022-46342
CVE-2022-46343
CVE-2022-46344
CVE-2023-0494
CVE-2023-1393
CWE-ID CWE-787
CWE-119
CWE-401
CWE-416
CWE-121
CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Gentoo Linux
Operating systems & Components / Operating system

x11-base/xwayland
Operating systems & Components / Operating system package or component

x11-base/xorg-server
Operating systems & Components / Operating system package or component

Vendor Gentoo

Security Bulletin

This security bulletin contains information about 15 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU59045

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-4008

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the SProcRenderCompositeGlyphs() function in the Render extension. A local user can send a specially crafted CompositeGlyphs request, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds write

EUVDB-ID: #VU59046

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-4009

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the ProcXFixesCreatePointerBarrier() function in the XFixes extension. A local user can send a specially crafted CreatePointerBarrier request, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Out-of-bounds write

EUVDB-ID: #VU59047

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-4010

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the SProcScreenSaverSuspend() function in the Screen Saver extension. A local user can send a specially crafted Suspend request, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Out-of-bounds write

EUVDB-ID: #VU59048

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-4011

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the SwapCreateRegister() function in the Record extension. A local user can send a specially crafted RecordCreateContext and RecordRegisterClients requests, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Buffer overflow

EUVDB-ID: #VU68415

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-3550

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the _GetCountedString() function in xkb/xkb.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Memory leak

EUVDB-ID: #VU68416

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-3551

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak within the ProcXkbGetKbdByName() function in xkb/xkb.c. A local user can force the application to leak memory and perform denial of service attack.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) Memory leak

EUVDB-ID: #VU68417

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-3553

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak within the xquartz component in hw/xquartz/X11Controller.m. A local user can force the application to leak memory and perform denial of service attack.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Use-after-free

EUVDB-ID: #VU70438

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-4283

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when handling XkbCopyNames requests. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Stack-based buffer overflow

EUVDB-ID: #VU70433

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-46340

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error  within the swap handler for the XTestFakeInput request of the XTest extension if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. A local user can trigger a stack-based buffer overflow and execute arbitrary code with elevated privileges.


Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Out-of-bounds read

EUVDB-ID: #VU70434

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-46341

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when handling XIPassiveUngrab requests. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Use-after-free

EUVDB-ID: #VU70435

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-46342

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when handling XvdiSelectVideoNotify requests. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.


Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Use-after-free

EUVDB-ID: #VU70436

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-46343

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when handling ScreenSaverSetAttributes requests. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.



Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

13) Out-of-bounds read

EUVDB-ID: #VU70437

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-46344

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when handling XIChangeProperty requests. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

14) Use-after-free

EUVDB-ID: #VU71991

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-0494

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within DeepCopyPointerClasses. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

15) Use-after-free

EUVDB-ID: #VU74180

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-1393

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when processing deletion of a compositor overlay window. A local user can trigger a use-after-free error and execute arbitrary code on the system.


Mitigation

Update the affected packages.
x11-base/xorg-server to version: 21.1.8
x11-base/xwayland to version: 23.1.1

Vulnerable software versions

Gentoo Linux: All versions

x11-base/xwayland: before 23.1.1

x11-base/xorg-server: before 21.1.8

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202305-30


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###