摘要:
xorg-x11-server-xwayland security update
安全等级: High
公告ID: KylinSec-SA-2024-1504
发布日期: 2024年5月10日
关联CVE: CVE-2024-31080 CVE-2024-31081 CVE-2024-0408 CVE-2023-6478 CVE-2023-6816
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.(CVE-2023-6478)
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.(CVE-2023-6816)
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.(CVE-2024-0408)
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-31080 | KY3.5.2 | xorg-x11-server-xwayland | Fixed |
CVE-2024-31081 | KY3.5.2 | xorg-x11-server-xwayland | Fixed |
CVE-2024-0408 | KY3.5.2 | xorg-x11-server-xwayland | Fixed |
CVE-2023-6478 | KY3.5.2 | xorg-x11-server-xwayland | Fixed |
CVE-2023-6816 | KY3.5.2 | xorg-x11-server-xwayland | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
xorg-x11-server-Xwayland | x86_64 | 22.1.2-5.ky3_5 |
xorg-x11-server-Xwayland-devel | x86_64 | 22.1.2-5.ky3_5 |
xorg-x11-server-Xwayland-devel | aarch64 | 22.1.2-5.ky3_5 |
xorg-x11-server-Xwayland | aarch64 | 22.1.2-5.ky3_5 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名
xorg-x11-server-Xwayland-devel