Unrated severityNVD Advisory· Published Dec 13, 2023· Updated Nov 20, 2025
Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty
CVE-2023-6478
Description
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
Affected products
53cpe:/a:redhat:enterprise_linux:8::appstream+ 4 more
- cpe:/a:redhat:enterprise_linux:8::appstreamrange: 0:21.1.3-15.el8
- cpe:/a:redhat:enterprise_linux:8::crbrange: 0:1.20.11-22.el8
- cpe:/a:redhat:enterprise_linux:9::appstreamrange: 0:22.1.9-5.el9
- cpe:/o:redhat:enterprise_linux:6
- cpe:/o:redhat:enterprise_linux:7::clientrange: 0:1.20.4-25.el7_9
cpe:/a:redhat:rhel_e4s:8.2::appstream+ 1 more
- cpe:/a:redhat:rhel_e4s:8.2::appstreamrange: 0:1.9.0-15.el8_2.6
- cpe:/a:redhat:rhel_e4s:8.4::appstreamrange: 0:1.11.0-8.el8_4.5
- Red Hat/Red Hat Enterprise Linux 8.6 Extended Update Supportv5cpe:/a:redhat:rhel_eus:8.6::appstreamRange: 0:1.12.0-6.el8_6.6
- Red Hat/Red Hat Enterprise Linux 8.8 Extended Update Supportv5cpe:/a:redhat:rhel_eus:8.8::appstreamRange: 0:1.12.0-15.el8_8.4
- Red Hat/Red Hat Enterprise Linux 9.0 Extended Update Supportv5cpe:/a:redhat:rhel_eus:9.0::appstreamRange: 0:1.11.0-22.el9_0.5
- Red Hat/Red Hat Enterprise Linux 9.2 Extended Update Supportv5cpe:/a:redhat:rhel_eus:9.2::appstreamRange: 0:1.12.0-14.el9_2.2
- Red Hat/Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONv5cpe:/o:redhat:rhel_els:6Range: 0:1.1.0-25.el6_10.13
- osv-coords41 versionspkg:rpm/almalinux/tigervncpkg:rpm/almalinux/tigervnc-iconspkg:rpm/almalinux/tigervnc-licensepkg:rpm/almalinux/tigervnc-selinuxpkg:rpm/almalinux/tigervnc-serverpkg:rpm/almalinux/tigervnc-server-minimalpkg:rpm/almalinux/tigervnc-server-modulepkg:rpm/almalinux/xorg-x11-server-commonpkg:rpm/almalinux/xorg-x11-server-develpkg:rpm/almalinux/xorg-x11-server-sourcepkg:rpm/almalinux/xorg-x11-server-Xdmxpkg:rpm/almalinux/xorg-x11-server-Xephyrpkg:rpm/almalinux/xorg-x11-server-Xnestpkg:rpm/almalinux/xorg-x11-server-Xorgpkg:rpm/almalinux/xorg-x11-server-Xvfbpkg:rpm/almalinux/xorg-x11-server-Xwaylandpkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xwayland&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5
< 1.13.1-3.el9_3.3.alma.1+ 40 more
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.13.1-3.el9_3.3.alma.1
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 1.20.11-24.el9
- (no CPE)range: < 22.1.9-5.el9
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 21.1.4-150500.7.10.1
- (no CPE)range: < 21.1.9-2.1
- (no CPE)range: < 21.1.4-150400.3.23.1
- (no CPE)range: < 22.1.5-150500.7.8.1
- (no CPE)range: < 23.2.2-3.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.20.3-150400.38.32.1
- (no CPE)range: < 21.1.4-150500.7.10.1
- (no CPE)range: < 1.20.3-150400.38.32.1
- (no CPE)range: < 21.1.4-150500.7.10.1
- (no CPE)range: < 1.19.6-10.59.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.19.6-10.59.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.19.6-10.59.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 1.20.3-150200.22.5.82.1
- (no CPE)range: < 21.1.4-150400.3.23.1
- (no CPE)range: < 22.1.5-150500.7.8.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
19- access.redhat.com/errata/RHSA-2023:7886mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0006mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0009mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0010mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0014mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0015mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0016mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0017mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0018mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:0020mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2169mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2170mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2995mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2024:2996mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:12751mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/security/cve/CVE-2023-6478mitrevdb-entryx_refsource_REDHAT
- bugzilla.redhat.com/show_bug.cgimitreissue-trackingx_refsource_REDHAT
- gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632mitre
- lists.x.org/archives/xorg-announce/2023-December/003435.htmlmitre
News mentions
0No linked articles in our index yet.