中危 xichangedeviceproperty/rrchangeoutputproperty 中的越界写入 (CVE-2023-5367)

CVE编号

CVE-2023-5367

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-10-26
漏洞描述
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://access.redhat.com/errata/RHSA-2023:6802
https://access.redhat.com/errata/RHSA-2023:6808
https://access.redhat.com/errata/RHSA-2023:7373
https://access.redhat.com/errata/RHSA-2023:7388
https://access.redhat.com/errata/RHSA-2023:7405
https://access.redhat.com/errata/RHSA-2023:7428
https://access.redhat.com/errata/RHSA-2023:7436
https://access.redhat.com/errata/RHSA-2023:7526
https://access.redhat.com/errata/RHSA-2023:7533
https://access.redhat.com/errata/RHSA-2024:0010
https://access.redhat.com/errata/RHSA-2024:0128
https://access.redhat.com/errata/RHSA-2024:2169
https://access.redhat.com/errata/RHSA-2024:2170
https://access.redhat.com/errata/RHSA-2024:2995
https://access.redhat.com/errata/RHSA-2024:2996
https://access.redhat.com/security/cve/CVE-2023-5367
https://bugzilla.redhat.com/show_bug.cgi?id=2243091
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.x.org/archives/xorg-announce/2023-October/003430.html
https://security.gentoo.org/glsa/202401-30
https://security.netapp.com/advisory/ntap-20231130-0004/
https://www.debian.org/security/2023/dsa-5534
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 x.org xwayland * Up to
(excluding)
23.2.2
运行在以下环境
应用 x.org x_server * Up to
(excluding)
21.1.9
运行在以下环境
系统 alibaba_cloud_linux_2.1903 tigervnc * Up to
(excluding)
1.8.0-26.1.al7
运行在以下环境
系统 alma_linux_9 tigervnc * Up to
(excluding)
1.13.1-3.el9_3.3.alma.1
运行在以下环境
系统 alpine_3.18 xwayland * Up to
(excluding)
21.1.9-r0
运行在以下环境
系统 alpine_3.19 xwayland * Up to
(excluding)
23.2.2-r0
运行在以下环境
系统 amazon_2 xorg-x11-server * Up to
(excluding)
1.20.4-22.amzn2.0.1
运行在以下环境
系统 amazon_2023 xorg-x11-server * Up to
(excluding)
1.20.14-26.amzn2023.0.1
运行在以下环境
系统 amazon_AMI xorg-x11-server * Up to
(excluding)
1.17.4-18.52.amzn1
运行在以下环境
系统 anolis_os_23 xorg-x11-server * Up to
(excluding)
1.20.14-12
运行在以下环境
系统 anolis_os_7 tigervnc * Up to
(excluding)
1.8.0-26
运行在以下环境
系统 anolis_os_8 tigervnc * Up to
(excluding)
1.12.0-16
运行在以下环境
系统 centos_7 tigervnc * Up to
(excluding)
1.8.0-26.el7_9
运行在以下环境
系统 debian debian_linux 11.0 -
运行在以下环境
系统 debian debian_linux 12.0 -
运行在以下环境
系统 debian_10 xorg-server * Up to
(excluding)
1.20.4-1+deb10u10
运行在以下环境
系统 debian_11 xorg-server * Up to
(excluding)
1.20.11-1+deb11u8
运行在以下环境
系统 fedoraproject fedora 38 -
运行在以下环境
系统 fedora_37 tigervnc * Up to
(excluding)
1.13.1-6.fc37
运行在以下环境
系统 fedora_38 tigervnc * Up to
(excluding)
1.13.1-6.fc38
运行在以下环境
系统 fedora_39 tigervnc * Up to
(excluding)
1.13.1-6.fc39
运行在以下环境
系统 kylinos_aarch64_V10 xorg-x11-server-Xdmx * Up to
(excluding)
1.20.4-24.el7_9
运行在以下环境
系统 kylinos_x86_64_V10 xorg-x11-server-Xdmx * Up to
(excluding)
1.20.4-24.el7_9
运行在以下环境
系统 opensuse_Leap_15.4 xwayland * Up to
(excluding)
21.1.4-150400.3.20.1
运行在以下环境
系统 opensuse_Leap_15.5 xwayland * Up to
(excluding)
22.1.5-150500.7.5.1
运行在以下环境
系统 oracle_7 tigervnc * Up to
(excluding)
1.8.0-26.0.1.el7_9
运行在以下环境
系统 oracle_9 tigervnc * Up to
(excluding)
1.13.1-3.el9_3.3
运行在以下环境
系统 redhat enterprise_linux 7.0 -
运行在以下环境
系统 redhat enterprise_linux 8.0 -
运行在以下环境
系统 redhat enterprise_linux 9.0 -
运行在以下环境
系统 redhat_7 tigervnc * Up to
(excluding)
1.8.0-26.el7_9
运行在以下环境
系统 redhat_8 tigervnc * Up to
(excluding)
1.13.1-2.el8_9.1
运行在以下环境
系统 redhat_9 tigervnc * Up to
(excluding)
1.13.1-3.el9_3.3
运行在以下环境
系统 suse_12_SP5 xorg-x11-server * Up to
(excluding)
1.19.6-10.56.1
运行在以下环境
系统 ubuntu_20.04 xorg-server * Up to
(excluding)
1.20.13-1ubuntu1~20.04.9
运行在以下环境
系统 ubuntu_22.04 xwayland * Up to
(excluding)
21.1.4-2ubuntu1.7~22.04.2
阿里云评分
6.5
  • 攻击路径
    本地
  • 攻击复杂度
    复杂
  • 权限要求
    普通权限
  • 影响范围
    越权影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-787 跨界内存写
阿里云安全产品覆盖情况