CVE-2023-6377

CVSS V2 None CVSS V3 None
Description
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
Overview
  • CVE ID
  • CVE-2023-6377
  • Assigner
  • redhat
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2023-12-13T06:27:40.758Z
  • Last Modified Date
  • 2024-05-29T23:06:03.044Z
References
Reference URL Reference Tags
http://www.openwall.com/lists/oss-security/2023/12/13/1
https://access.redhat.com/errata/RHSA-2023:7886 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0006 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0009 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0010 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0014 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0015 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0016 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0017 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0018 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0020 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:2169 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:2170 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:2995 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:2996 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2023-6377 vdb-entry x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2253291 issue-tracking x_refsource_REDHAT
https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
https://lists.x.org/archives/xorg-announce/2023-December/003435.html
https://security.gentoo.org/glsa/202401-30
https://security.netapp.com/advisory/ntap-20240125-0003/
https://www.debian.org/security/2023/dsa-5576
History
Created Old Value New Value Data Type Notes
2024-06-25 06:47:17 Added to TrackCVE