Unrated severityNVD Advisory· Published Oct 25, 2023· Updated Nov 6, 2025
Xorg-x11-server: out-of-bounds write in xichangedeviceproperty/rrchangeoutputproperty
CVE-2023-5367
Description
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
Affected products
57- Red Hat/Red Hat Enterprise Linux 8v52 versions
cpe:/a:redhat:enterprise_linux:8::appstream+ 1 more
- cpe:/a:redhat:enterprise_linux:8::appstreamrange: 0:21.1.3-15.el8
- cpe:/a:redhat:enterprise_linux:8::crbrange: 0:1.20.11-22.el8
- Red Hat/Red Hat Enterprise Linux 9v52 versions
cpe:/a:redhat:enterprise_linux:9::appstream+ 1 more
- cpe:/a:redhat:enterprise_linux:9::appstreamrange: 0:22.1.9-5.el9
- cpe:/a:redhat:enterprise_linux:9::crbrange: 0:1.20.11-24.el9
- Red Hat/Red Hat Enterprise Linux 8.2 Update Services for SAP Solutionsv5cpe:/a:redhat:rhel_aus:8.2::appstreamRange: 0:1.9.0-15.el8_2.4
- Red Hat/Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionsv5cpe:/a:redhat:rhel_e4s:8.1::appstreamRange: 0:1.9.0-16.el8_1.4
- Red Hat/Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionsv5cpe:/a:redhat:rhel_e4s:8.4::appstreamRange: 0:1.11.0-8.el8_4.3
- Red Hat/Red Hat Enterprise Linux 8.6 Extended Update Supportv5cpe:/a:redhat:rhel_eus:8.6::appstreamRange: 0:1.12.0-6.el8_6.4
- Red Hat/Red Hat Enterprise Linux 8.8 Extended Update Supportv5cpe:/a:redhat:rhel_eus:8.8::appstreamRange: 0:1.12.0-15.el8_8.1
- Red Hat/Red Hat Enterprise Linux 9.0 Extended Update Supportv5cpe:/a:redhat:rhel_eus:9.0::appstreamRange: 0:1.11.0-22.el9_0.3
- Red Hat/Red Hat Enterprise Linux 9.2 Extended Update Supportv5cpe:/a:redhat:rhel_eus:9.2::appstreamRange: 0:1.12.0-14.el9_2
- Red Hat/Red Hat Enterprise Linux 6v5cpe:/o:redhat:enterprise_linux:6
- Red Hat/Red Hat Enterprise Linux 7v5cpe:/o:redhat:enterprise_linux:7::clientRange: 0:1.8.0-26.el7_9
- Red Hat/Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONv5cpe:/o:redhat:rhel_els:6Range: 0:1.1.0-25.el6_10.13
- osv-coords43 versionspkg:rpm/almalinux/tigervncpkg:rpm/almalinux/tigervnc-iconspkg:rpm/almalinux/tigervnc-licensepkg:rpm/almalinux/tigervnc-selinuxpkg:rpm/almalinux/tigervnc-serverpkg:rpm/almalinux/tigervnc-server-minimalpkg:rpm/almalinux/tigervnc-server-modulepkg:rpm/almalinux/xorg-x11-server-commonpkg:rpm/almalinux/xorg-x11-server-develpkg:rpm/almalinux/xorg-x11-server-sourcepkg:rpm/almalinux/xorg-x11-server-Xdmxpkg:rpm/almalinux/xorg-x11-server-Xephyrpkg:rpm/almalinux/xorg-x11-server-Xnestpkg:rpm/almalinux/xorg-x11-server-Xorgpkg:rpm/almalinux/xorg-x11-server-Xvfbpkg:rpm/almalinux/xorg-x11-server-Xwaylandpkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xwayland&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5
< 1.13.1-3.el9_3.3.alma.1+ 42 more
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 22.1.9-5.el9
- (no CPE)range: < 1.20.3-150400.38.29.1
- (no CPE)range: < 21.1.4-150500.7.7.1
- (no CPE)range: < 21.1.9-1.1
- (no CPE)range: < 21.1.4-150400.3.20.1
- (no CPE)range: < 22.1.5-150500.7.5.1
- (no CPE)range: < 23.2.2-1.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150400.38.29.1
- (no CPE)range: < 21.1.4-150500.7.7.1
- (no CPE)range: < 1.20.3-150400.38.29.1
- (no CPE)range: < 21.1.4-150500.7.7.1
- (no CPE)range: < 1.19.6-10.56.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.19.6-10.56.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.19.6-10.56.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 1.20.3-150200.22.5.79.1
- (no CPE)range: < 21.1.4-150400.3.20.1
- (no CPE)range: < 22.1.5-150500.7.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
19- access.redhat.com/errata/RHSA-2023:6802mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:6808mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7373mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7388mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7405mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7428mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7436mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7526mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7533mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0010mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0128mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2169mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2170mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2995mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2996mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:12751mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/security/cve/CVE-2023-5367mitrevdb-entryx_refsource_REDHAT
- bugzilla.redhat.com/show_bug.cgimitreissue-trackingx_refsource_REDHAT
- lists.x.org/archives/xorg-announce/2023-October/003430.htmlmitre
News mentions
0No linked articles in our index yet.