CVE-2023-6478
Name
CVE-2023-6478
Description
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
NVD Severity
unknown
Other trackers
CVE
,
NVD
,
CERT
,
CVE Details
,
CIRCL
,
Arch Linux
,
Debian
,
Red Hat
,
Ubuntu
,
Gentoo
,
SUSE (Bugzilla)
,
SUSE (CVE)
,
Mageia
Mailing lists
oss-security
,
full-disclosure
,
bugtraq
Exploits
Exploit DB
,
Metasploit
Forges
GitHub (
code
,
issues
), Aports (
code
,
issues
)
References
Type
URI
secalert@redhat.com
https://access.redhat.com/security/cve/CVE-2023-6478
secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2253298
secalert@redhat.com
https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
secalert@redhat.com
https://lists.x.org/archives/xorg-announce/2023-December/003435.html
secalert@redhat.com
https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
secalert@redhat.com
https://www.debian.org/security/2023/dsa-5576
secalert@redhat.com
http://www.openwall.com/lists/oss-security/2023/12/13/1
secalert@redhat.com
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
secalert@redhat.com
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:7886
secalert@redhat.com
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0006
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0009
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0010
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0014
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0015
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0016
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0017
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0018
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0020
secalert@redhat.com
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
secalert@redhat.com
https://security.netapp.com/advisory/ntap-20240125-0003/
secalert@redhat.com
https://security.gentoo.org/glsa/202401-30
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2169
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2170
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2995
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2996
Match rules
CPE URI
Source package
Min version
Max version
cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
x_server
>= None
< 21.1.10
Vulnerable and fixed packages
Source package
Branch
Version
Maintainer
Status