• 公告ID (KylinSec-SA-2024-1504)

摘要:

xorg-x11-server-xwayland security update

安全等级: High

公告ID: KylinSec-SA-2024-1504

发布日期: 2024年5月10日

关联CVE: CVE-2024-31080   CVE-2024-31081   CVE-2024-0408   CVE-2023-6478   CVE-2023-6816  

  • 详细介绍

1. 漏洞描述

   

Xwayland is an X server for running X clients under Wayland.
Security Fix(es):

A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.(CVE-2023-6478)

A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.(CVE-2023-6816)

A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.(CVE-2024-0408)

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-31080 KY3.5.2 xorg-x11-server-xwayland Fixed
CVE-2024-31081 KY3.5.2 xorg-x11-server-xwayland Fixed
CVE-2024-0408 KY3.5.2 xorg-x11-server-xwayland Fixed
CVE-2023-6478 KY3.5.2 xorg-x11-server-xwayland Fixed
CVE-2023-6816 KY3.5.2 xorg-x11-server-xwayland Fixed

3. 影响组件

    xorg-x11-server-xwayland

4. 修复版本

   

KY3.5.2

软件名称 架构 版本号
xorg-x11-server-Xwayland x86_64 22.1.2-5.ky3_5
xorg-x11-server-Xwayland-devel x86_64 22.1.2-5.ky3_5
xorg-x11-server-Xwayland-devel aarch64 22.1.2-5.ky3_5
xorg-x11-server-Xwayland aarch64 22.1.2-5.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.2:

x86_64:

     xorg-x11-server-Xwayland   

     xorg-x11-server-Xwayland-devel   

aarch64:

     xorg-x11-server-Xwayland-devel   

     xorg-x11-server-Xwayland   

上一篇:KylinSec-SA-2024-1503 下一篇:KylinSec-SA-2024-1505